984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:31:16 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d3030303030303030303030303030303030303737303233", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:31:17 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:31:17 executing program 2: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:31:17 executing program 7: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) r1 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) r4 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r4, {0x722e}}, './file0\x00'}) 11:31:17 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:31:17 executing program 3: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{0x0}], 0x1}, 0x0) fork() 11:31:17 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:31:17 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d3030303030303030303030303030303030303737303233", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:31:17 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gi', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:31:17 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) r1 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) r4 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r4, {0x722e}}, './file0\x00'}) 11:31:17 executing program 7: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) r1 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) r4 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r4, {0x722e}}, './file0\x00'}) 11:31:17 executing program 2: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:31:17 executing program 3: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{0x0}], 0x1}, 0x0) fork() 11:31:17 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gi', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:31:17 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d3030303030303030303030303030303030303737303233", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:31:31 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gi', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:31:31 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) syz_open_procfs(0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) r4 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r4, {0x722e}}, './file0\x00'}) 11:31:31 executing program 2: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:31:31 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:31:31 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:31:31 executing program 7: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:31:31 executing program 1: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:31:31 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:31:31 executing program 2: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) 11:31:31 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:31:31 executing program 7: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:31:45 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:31:45 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:31:45 executing program 1: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:31:45 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:31:45 executing program 3: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:31:45 executing program 2: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) 11:31:45 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:31:45 executing program 6: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:31:45 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c676964", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:31:45 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:31:45 executing program 2: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) 11:31:45 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c676964", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:31:45 executing program 6: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) fork() 11:31:45 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r2, 0x0, r2) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:31:45 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:31:45 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:31:45 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:31:45 executing program 7: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:31:45 executing program 6: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:31:45 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c676964", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:31:45 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, &(0x7f0000000140)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:31:45 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c676964", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:31:58 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:31:58 executing program 2: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x722e}}, './file0\x00'}) 11:31:58 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c676964", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:31:58 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c676964", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:31:58 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, &(0x7f0000000140)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:31:58 executing program 7: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:31:58 executing program 6: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:31:58 executing program 1: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) fork() 11:32:13 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, &(0x7f0000000140)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:32:13 executing program 7: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:32:13 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:32:13 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:32:13 executing program 1: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:32:13 executing program 6: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:32:13 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:32:13 executing program 2: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x722e}}, './file0\x00'}) 11:32:14 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:32:14 executing program 2: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x722e}}, './file0\x00'}) 11:32:14 executing program 3: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:32:14 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:32:14 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:32:14 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:32:14 executing program 7: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:32:14 executing program 2: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) 11:32:14 executing program 1: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:32:14 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:32:26 executing program 7: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) fork() 11:32:26 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:32:26 executing program 1: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) fork() 11:32:26 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r4, 0x0, r4) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) 11:32:26 executing program 2: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) 11:32:26 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:32:26 executing program 3: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:32:26 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:32:26 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:32:26 executing program 6: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:32:26 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:32:26 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:32:26 executing program 3: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:32:26 executing program 2: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) 11:32:27 executing program 7: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:32:27 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:32:27 executing program 1: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:32:27 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:32:27 executing program 6: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:32:27 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:32:39 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) 11:32:39 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:32:39 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) r6 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r5, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r6, {0x722e}}, './file0\x00'}) 11:32:39 executing program 3: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:32:39 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) fork() 11:32:39 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:32:39 executing program 7: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:32:39 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r4, 0x0, r4) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) 11:32:39 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:32:52 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:32:52 executing program 7: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:32:52 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) 11:32:52 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:32:52 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) r6 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r5, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r6, {0x722e}}, './file0\x00'}) 11:32:52 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:32:52 executing program 3: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:32:52 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) 11:32:52 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) r6 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r5, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r6, {0x722e}}, './file0\x00'}) 11:32:52 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) 11:32:52 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:32:52 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) 11:32:52 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r4, {0x722e}}, './file0\x00'}) 11:32:52 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:32:52 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:32:52 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r4, 0x0, r4) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) 11:32:52 executing program 3: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:32:52 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18}, './file0\x00'}) 11:32:52 executing program 7: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r4, 0x0, r4) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) 11:33:05 executing program 1: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:33:05 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gi', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:33:05 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:33:05 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18}, './file0\x00'}) 11:33:05 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:33:05 executing program 3: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:33:05 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gi', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:33:05 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r4, 0x0, r4) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) 11:33:05 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gi', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:33:05 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18}, './file0\x00'}) 11:33:05 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gi', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:33:05 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r4, {0x722e}}, './file0\x00'}) 11:33:05 executing program 7: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) 11:33:05 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gi', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:33:18 executing program 3: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:33:18 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gi', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:33:18 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:33:18 executing program 2: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:33:18 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) 11:33:18 executing program 1: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:33:18 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:33:18 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) 11:33:18 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:33:18 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:33:18 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:33:18 executing program 3: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:33:18 executing program 6: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:33:18 executing program 1: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:33:18 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:33:18 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:33:18 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:33:18 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) 11:33:18 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) 11:33:34 executing program 6: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:33:34 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:33:34 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r4, 0x0, r4) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) 11:33:34 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:33:34 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, &(0x7f0000000140)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:33:34 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:33:34 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) r6 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r5, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r6, {0x722e}}, './file0\x00'}) 11:33:34 executing program 2: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:33:34 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:33:34 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) r5 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r4, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r5, {0x722e}}, './file0\x00'}) 11:33:34 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, &(0x7f0000000140)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:33:34 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) r5 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r4, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r5, {0x722e}}, './file0\x00'}) 11:33:34 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:33:34 executing program 2: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:33:34 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:33:34 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:33:34 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:33:47 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:33:47 executing program 3: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:33:47 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:33:47 executing program 6: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:33:47 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:33:47 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, &(0x7f0000000140)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:33:47 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) 11:33:47 executing program 2: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:33:47 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) 11:33:47 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:33:47 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:33:47 executing program 3: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:33:48 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:33:48 executing program 6: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:34:00 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) fork() 11:34:00 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) 11:34:00 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) r5 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r4, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r5, {0x722e}}, './file0\x00'}) 11:34:00 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) r6 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r5, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r6, {0x722e}}, './file0\x00'}) 11:34:00 executing program 3: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:34:00 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:34:00 executing program 6: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:34:00 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:34:00 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:34:00 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:34:00 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) 11:34:00 executing program 2: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) fork() 11:34:01 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:34:01 executing program 3: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:34:01 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:34:01 executing program 6: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:34:13 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:34:13 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:34:13 executing program 6: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:34:13 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) r6 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r5, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r6, {0x722e}}, './file0\x00'}) 11:34:13 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:34:13 executing program 2: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:34:13 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:34:13 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:34:14 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) r6 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r5, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r6, {0x722e}}, './file0\x00'}) 11:34:14 executing program 6: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:34:14 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) 11:34:14 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) 11:34:14 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:34:14 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) 11:34:14 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) r5 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r4, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r5, {0x722e}}, './file0\x00'}) 11:34:14 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) fork() 11:34:27 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) fork() 11:34:27 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 11:34:27 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:34:27 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) r5 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r4, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r5, {0x722e}}, './file0\x00'}) 11:34:27 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) 11:34:27 executing program 6: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:34:27 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:34:27 executing program 3: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:34:27 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) 11:34:27 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) r6 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r5, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r6, {0x722e}}, './file0\x00'}) 11:34:27 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) r6 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r5, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r6, {0x722e}}, './file0\x00'}) 11:34:27 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:34:27 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) fork() 11:34:27 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 11:34:27 executing program 3: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) fork() 11:34:27 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:34:27 executing program 6: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) socket$nl_generic(0x10, 0x3, 0x10) fork() 11:34:27 executing program 7: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) 11:34:27 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:34:27 executing program 2: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:34:39 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) 11:34:39 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:34:39 executing program 2: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:34:39 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) 11:34:39 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) socket$nl_generic(0x10, 0x3, 0x10) fork() 11:34:39 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:34:39 executing program 6: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:34:39 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:34:39 executing program 3: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:34:39 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) r6 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r5, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r6, {0x722e}}, './file0\x00'}) 11:34:39 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:34:39 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) 11:34:39 executing program 2: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) 11:34:39 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) 11:34:40 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:34:40 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() 11:34:52 executing program 6: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:34:52 executing program 2: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:34:52 executing program 3: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:34:52 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) fork() 11:34:52 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:34:52 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) r6 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r5, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r6, {0x722e}}, './file0\x00'}) 11:34:52 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) fork() 11:34:52 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:34:52 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:34:53 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) fork() 11:34:53 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:34:53 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) r1 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r3 = syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32=r0, @ANYBLOB="01800000000000002e2f66696c653000"]) r6 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r5, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r6, {0x722e}}, './file0\x00'}) 11:34:53 executing program 3: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() [ 1659.358679] FAULT_INJECTION: forcing a failure. [ 1659.358679] name failslab, interval 1, probability 0, space 0, times 1 [ 1659.360037] CPU: 1 PID: 15332 Comm: syz-executor.6 Not tainted 5.10.209 #1 [ 1659.360762] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1659.361635] Call Trace: [ 1659.361921] dump_stack+0x107/0x167 [ 1659.362309] should_fail.cold+0x5/0xa [ 1659.362709] ? getname_flags.part.0+0x50/0x4f0 [ 1659.363189] should_failslab+0x5/0x20 [ 1659.363596] kmem_cache_alloc+0x5b/0x310 [ 1659.364028] getname_flags.part.0+0x50/0x4f0 [ 1659.364492] getname_flags+0x9a/0xe0 [ 1659.364883] do_mkdirat+0x8f/0x2b0 [ 1659.365260] ? user_path_create+0xf0/0xf0 [ 1659.365701] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1659.366251] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1659.366797] do_syscall_64+0x33/0x40 [ 1659.367192] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1659.367730] RIP: 0033:0x7f5a31118c27 [ 1659.368119] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1659.370032] RSP: 002b:00007f5a2e68efa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1659.370828] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5a31118c27 [ 1659.371582] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 1659.372355] RBP: 00007f5a2e68f040 R08: 0000000000000000 R09: 0000000000020020 [ 1659.373111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000040 [ 1659.373869] R13: 00000000200000c0 R14: 00007f5a2e68f000 R15: 00000000200002c0 [ 1659.393124] FAULT_INJECTION: forcing a failure. [ 1659.393124] name failslab, interval 1, probability 0, space 0, times 0 [ 1659.394507] CPU: 1 PID: 15341 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1659.395235] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1659.396058] Call Trace: [ 1659.396339] dump_stack+0x107/0x167 [ 1659.396726] should_fail.cold+0x5/0xa [ 1659.397147] ? getname_flags.part.0+0x50/0x4f0 [ 1659.397635] should_failslab+0x5/0x20 [ 1659.398239] kmem_cache_alloc+0x5b/0x310 [ 1659.398811] getname_flags.part.0+0x50/0x4f0 11:35:06 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) fork() 11:35:06 executing program 7: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() (fail_nth: 1) 11:35:06 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 1) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:35:06 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:35:06 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 1) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:35:06 executing program 2: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:35:06 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 1) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:35:06 executing program 3: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() [ 1659.399413] getname_flags+0x9a/0xe0 [ 1659.399811] do_mkdirat+0x8f/0x2b0 [ 1659.400188] ? user_path_create+0xf0/0xf0 [ 1659.400624] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1659.401176] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1659.401713] do_syscall_64+0x33/0x40 [ 1659.402104] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1659.402640] RIP: 0033:0x7f168586fc27 [ 1659.403034] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1659.405022] RSP: 002b:00007f1682de5fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1659.405852] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f168586fc27 [ 1659.406590] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 1659.407368] RBP: 00007f1682de6040 R08: 0000000000000000 R09: 0000000000020020 [ 1659.408119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000040 [ 1659.408889] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 [ 1659.452480] FAULT_INJECTION: forcing a failure. [ 1659.452480] name failslab, interval 1, probability 0, space 0, times 0 [ 1659.454563] CPU: 0 PID: 15335 Comm: syz-executor.7 Not tainted 5.10.209 #1 [ 1659.455646] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1659.456913] Call Trace: [ 1659.457326] dump_stack+0x107/0x167 [ 1659.457890] should_fail.cold+0x5/0xa [ 1659.458485] ? copy_process+0x3285/0x7800 [ 1659.459132] should_failslab+0x5/0x20 [ 1659.459725] kmem_cache_alloc_node+0x55/0x330 [ 1659.460416] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1659.461227] copy_process+0x3285/0x7800 [ 1659.461837] ? __lock_acquire+0xbb1/0x5b00 [ 1659.462502] ? lock_downgrade+0x6d0/0x6d0 [ 1659.463141] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1659.463957] ? __cleanup_sighand+0xb0/0xb0 [ 1659.464617] ? lock_acquire+0x197/0x470 [ 1659.465211] ? find_held_lock+0x2c/0x110 [ 1659.465950] kernel_clone+0xe7/0x980 [ 1659.466524] ? lock_downgrade+0x6d0/0x6d0 [ 1659.467156] ? find_held_lock+0x2c/0x110 [ 1659.467783] ? create_io_thread+0xf0/0xf0 [ 1659.468418] ? ksys_write+0x12d/0x260 [ 1659.469018] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1659.469761] __do_sys_fork+0x8a/0xc0 [ 1659.470338] ? kernel_thread+0xf0/0xf0 [ 1659.470954] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1659.471764] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1659.472548] ? trace_hardirqs_on+0x5b/0x180 [ 1659.473212] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1659.474001] do_syscall_64+0x33/0x40 [ 1659.474571] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1659.475361] RIP: 0033:0x7ff0c2928b19 [ 1659.475937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1659.478743] RSP: 002b:00007ff0bfe9e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1659.479910] RAX: ffffffffffffffda RBX: 00007ff0c2a3bf60 RCX: 00007ff0c2928b19 [ 1659.481006] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1659.482089] RBP: 00007ff0bfe9e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1659.483181] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1659.484269] R13: 00007ffe877d9f7f R14: 00007ff0bfe9e300 R15: 0000000000022000 [ 1659.509830] FAULT_INJECTION: forcing a failure. [ 1659.509830] name failslab, interval 1, probability 0, space 0, times 0 [ 1659.512151] CPU: 0 PID: 15344 Comm: syz-executor.5 Not tainted 5.10.209 #1 [ 1659.513316] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1659.514568] Call Trace: [ 1659.514974] dump_stack+0x107/0x167 [ 1659.515543] should_fail.cold+0x5/0xa [ 1659.516119] ? getname_flags.part.0+0x50/0x4f0 [ 1659.516813] should_failslab+0x5/0x20 [ 1659.517390] kmem_cache_alloc+0x5b/0x310 [ 1659.518022] getname_flags.part.0+0x50/0x4f0 [ 1659.518693] getname_flags+0x9a/0xe0 [ 1659.519256] do_mkdirat+0x8f/0x2b0 [ 1659.519806] ? user_path_create+0xf0/0xf0 [ 1659.520436] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1659.521196] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1659.521989] do_syscall_64+0x33/0x40 [ 1659.522553] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1659.523326] RIP: 0033:0x7f209636fc27 [ 1659.523901] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1659.526667] RSP: 002b:00007f20938e5fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1659.527832] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f209636fc27 [ 1659.528916] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 1659.529988] RBP: 00007f20938e6040 R08: 0000000000000000 R09: 0000000000020020 [ 1659.531070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000040 [ 1659.532158] R13: 00000000200000c0 R14: 00007f20938e6000 R15: 00000000200002c0 11:35:06 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) fork() 11:35:06 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 2) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:35:06 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:35:06 executing program 7: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() (fail_nth: 2) 11:35:06 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) [ 1659.672752] FAULT_INJECTION: forcing a failure. [ 1659.672752] name failslab, interval 1, probability 0, space 0, times 0 [ 1659.674056] CPU: 1 PID: 15458 Comm: syz-executor.7 Not tainted 5.10.209 #1 [ 1659.674632] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1659.675328] Call Trace: [ 1659.675566] dump_stack+0x107/0x167 [ 1659.675869] should_fail.cold+0x5/0xa [ 1659.676200] ? create_object.isra.0+0x3a/0xa20 [ 1659.676585] should_failslab+0x5/0x20 [ 1659.676915] kmem_cache_alloc+0x5b/0x310 [ 1659.677263] create_object.isra.0+0x3a/0xa20 [ 1659.677619] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1659.678032] kmem_cache_alloc_node+0x169/0x330 [ 1659.678405] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1659.678837] copy_process+0x3285/0x7800 [ 1659.679160] ? __lock_acquire+0xbb1/0x5b00 [ 1659.679516] ? lock_downgrade+0x6d0/0x6d0 [ 1659.679857] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1659.680304] ? __cleanup_sighand+0xb0/0xb0 [ 1659.680657] ? lock_acquire+0x197/0x470 [ 1659.681015] ? find_held_lock+0x2c/0x110 [ 1659.681365] kernel_clone+0xe7/0x980 [ 1659.681670] ? lock_downgrade+0x6d0/0x6d0 [ 1659.682015] ? find_held_lock+0x2c/0x110 [ 1659.682354] ? create_io_thread+0xf0/0xf0 [ 1659.682708] ? ksys_write+0x12d/0x260 [ 1659.683043] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1659.683456] __do_sys_fork+0x8a/0xc0 [ 1659.683771] ? kernel_thread+0xf0/0xf0 [ 1659.684122] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1659.684544] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1659.684973] ? trace_hardirqs_on+0x5b/0x180 [ 1659.685329] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1659.685751] do_syscall_64+0x33/0x40 [ 1659.686061] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1659.686484] RIP: 0033:0x7ff0c2928b19 [ 1659.686790] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1659.688353] RSP: 002b:00007ff0bfe9e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1659.688993] RAX: ffffffffffffffda RBX: 00007ff0c2a3bf60 RCX: 00007ff0c2928b19 [ 1659.689584] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1659.690178] RBP: 00007ff0bfe9e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1659.690762] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1659.691363] R13: 00007ffe877d9f7f R14: 00007ff0bfe9e300 R15: 0000000000022000 [ 1659.698482] FAULT_INJECTION: forcing a failure. [ 1659.698482] name failslab, interval 1, probability 0, space 0, times 0 [ 1659.700508] CPU: 0 PID: 15453 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1659.701695] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1659.702989] Call Trace: [ 1659.703404] dump_stack+0x107/0x167 [ 1659.703997] should_fail.cold+0x5/0xa [ 1659.704593] ? create_object.isra.0+0x3a/0xa20 [ 1659.705307] should_failslab+0x5/0x20 [ 1659.705908] kmem_cache_alloc+0x5b/0x310 [ 1659.706537] ? ksys_write+0x21a/0x260 [ 1659.707139] create_object.isra.0+0x3a/0xa20 [ 1659.707829] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1659.708621] kmem_cache_alloc+0x159/0x310 [ 1659.709275] getname_flags.part.0+0x50/0x4f0 [ 1659.709958] getname_flags+0x9a/0xe0 [ 1659.710535] do_mkdirat+0x8f/0x2b0 [ 1659.711095] ? user_path_create+0xf0/0xf0 [ 1659.711755] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1659.712562] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1659.713373] do_syscall_64+0x33/0x40 [ 1659.713954] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1659.714744] RIP: 0033:0x7f168586fc27 [ 1659.715318] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1659.718168] RSP: 002b:00007f1682de5fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1659.719351] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f168586fc27 [ 1659.720452] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 1659.721549] RBP: 00007f1682de6040 R08: 0000000000000000 R09: 0000000000020020 [ 1659.722644] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000040 [ 1659.723748] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 11:35:06 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:35:06 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) (fail_nth: 1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:35:06 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 1) 11:35:06 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 2) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) [ 1659.879730] FAULT_INJECTION: forcing a failure. [ 1659.879730] name failslab, interval 1, probability 0, space 0, times 0 [ 1659.881113] CPU: 1 PID: 15464 Comm: syz-executor.1 Not tainted 5.10.209 #1 [ 1659.881681] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1659.882388] Call Trace: [ 1659.882651] dump_stack+0x107/0x167 [ 1659.883063] should_fail.cold+0x5/0xa [ 1659.883391] ? vm_area_dup+0x78/0x290 [ 1659.883726] should_failslab+0x5/0x20 [ 1659.884042] kmem_cache_alloc+0x5b/0x310 [ 1659.884380] vm_area_dup+0x78/0x290 [ 1659.884686] ? lock_downgrade+0x6d0/0x6d0 [ 1659.885045] ? mark_lock+0xf5/0x2df0 [ 1659.885362] ? lock_chain_count+0x20/0x20 [ 1659.885725] ? avc_has_extended_perms+0xf40/0xf40 [ 1659.886141] ? avc_has_perm_noaudit+0x1c9/0x3e0 [ 1659.886515] ? lock_downgrade+0x6d0/0x6d0 [ 1659.886856] ? __lock_acquire+0x1657/0x5b00 [ 1659.887210] ? vm_area_alloc+0x110/0x110 [ 1659.887546] ? __lock_acquire+0x1657/0x5b00 [ 1659.887917] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1659.888344] ? vmacache_find+0x55/0x2a0 [ 1659.888670] __split_vma+0xa8/0x570 [ 1659.888976] __do_munmap+0xfae/0x1260 [ 1659.889290] ? lock_release+0x680/0x680 [ 1659.889613] mmap_region+0x776/0x1590 [ 1659.889937] ? get_unmapped_area+0x2f0/0x420 [ 1659.890297] do_mmap+0xcdb/0x11e0 [ 1659.890587] vm_mmap_pgoff+0x198/0x1f0 [ 1659.890903] ? randomize_page+0xb0/0xb0 [ 1659.891238] ? __fget_files+0x296/0x4c0 [ 1659.891570] ksys_mmap_pgoff+0x41c/0x560 [ 1659.891911] ? find_mergeable_anon_vma+0x250/0x250 [ 1659.892319] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1659.892745] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1659.893176] do_syscall_64+0x33/0x40 [ 1659.893480] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1659.893899] RIP: 0033:0x7f53b7595b19 [ 1659.894205] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1659.895700] RSP: 002b:00007f53b4b0b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1659.896309] RAX: ffffffffffffffda RBX: 00007f53b76a8f60 RCX: 00007f53b7595b19 [ 1659.896895] RDX: 0000000000000002 RSI: 0000000000c00000 RDI: 0000000020000000 [ 1659.897468] RBP: 00007f53b4b0b1d0 R08: 0000000000000006 R09: 0000000000000000 [ 1659.898049] R10: 000000000001f012 R11: 0000000000000246 R12: 0000000000000001 [ 1659.898626] R13: 00007ffec3a5b12f R14: 00007f53b4b0b300 R15: 0000000000022000 [ 1659.903292] FAULT_INJECTION: forcing a failure. [ 1659.903292] name failslab, interval 1, probability 0, space 0, times 0 [ 1659.904465] CPU: 1 PID: 15467 Comm: syz-executor.5 Not tainted 5.10.209 #1 [ 1659.905031] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1659.905695] Call Trace: [ 1659.905919] dump_stack+0x107/0x167 [ 1659.906219] should_fail.cold+0x5/0xa [ 1659.906527] ? create_object.isra.0+0x3a/0xa20 [ 1659.906904] should_failslab+0x5/0x20 [ 1659.907215] kmem_cache_alloc+0x5b/0x310 [ 1659.907550] ? ksys_write+0x21a/0x260 [ 1659.907870] create_object.isra.0+0x3a/0xa20 [ 1659.908226] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1659.908638] kmem_cache_alloc+0x159/0x310 [ 1659.908992] getname_flags.part.0+0x50/0x4f0 [ 1659.909348] getname_flags+0x9a/0xe0 [ 1659.909669] do_mkdirat+0x8f/0x2b0 [ 1659.909982] ? user_path_create+0xf0/0xf0 [ 1659.910349] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1659.910774] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1659.911204] do_syscall_64+0x33/0x40 [ 1659.911513] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1659.911937] RIP: 0033:0x7f209636fc27 [ 1659.912256] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1659.913771] RSP: 002b:00007f20938e5fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1659.914408] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f209636fc27 [ 1659.915009] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 1659.915600] RBP: 00007f20938e6040 R08: 0000000000000000 R09: 0000000000020020 [ 1659.916199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000040 [ 1659.916786] R13: 00000000200000c0 R14: 00007f20938e6000 R15: 00000000200002c0 [ 1659.919101] FAULT_INJECTION: forcing a failure. [ 1659.919101] name failslab, interval 1, probability 0, space 0, times 0 [ 1659.920069] CPU: 1 PID: 15466 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1659.920634] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1659.921331] Call Trace: [ 1659.921550] dump_stack+0x107/0x167 [ 1659.921850] should_fail.cold+0x5/0xa [ 1659.922183] ? copy_process+0x3285/0x7800 [ 1659.922524] should_failslab+0x5/0x20 [ 1659.922839] kmem_cache_alloc_node+0x55/0x330 [ 1659.923214] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1659.923666] copy_process+0x3285/0x7800 [ 1659.924001] ? __lock_acquire+0xbb1/0x5b00 [ 1659.924359] ? lock_downgrade+0x6d0/0x6d0 [ 1659.924699] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1659.925136] ? __cleanup_sighand+0xb0/0xb0 [ 1659.925485] ? lock_acquire+0x197/0x470 [ 1659.925815] ? find_held_lock+0x2c/0x110 [ 1659.926149] kernel_clone+0xe7/0x980 [ 1659.926451] ? lock_downgrade+0x6d0/0x6d0 [ 1659.926786] ? find_held_lock+0x2c/0x110 [ 1659.927110] ? create_io_thread+0xf0/0xf0 [ 1659.927456] ? ksys_write+0x12d/0x260 [ 1659.927780] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1659.928179] __do_sys_fork+0x8a/0xc0 [ 1659.928480] ? kernel_thread+0xf0/0xf0 [ 1659.928804] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1659.929239] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1659.929656] ? trace_hardirqs_on+0x5b/0x180 [ 1659.930012] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1659.930428] do_syscall_64+0x33/0x40 [ 1659.930727] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1659.931153] RIP: 0033:0x7fe69fe62b19 [ 1659.931448] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1659.932933] RSP: 002b:00007fe69d3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1659.933754] RAX: ffffffffffffffda RBX: 00007fe69ff75f60 RCX: 00007fe69fe62b19 [ 1659.934426] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1659.935000] RBP: 00007fe69d3d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1659.935587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1659.936156] R13: 00007ffffc31f9df R14: 00007fe69d3d8300 R15: 0000000000022000 [ 1673.976512] FAULT_INJECTION: forcing a failure. [ 1673.976512] name failslab, interval 1, probability 0, space 0, times 0 [ 1673.977741] CPU: 1 PID: 15581 Comm: syz-executor.3 Not tainted 5.10.209 #1 [ 1673.978260] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1673.978919] Call Trace: [ 1673.979139] dump_stack+0x107/0x167 [ 1673.979423] should_fail.cold+0x5/0xa [ 1673.979744] ? copy_process+0x3285/0x7800 [ 1673.980061] should_failslab+0x5/0x20 [ 1673.980367] kmem_cache_alloc_node+0x55/0x330 [ 1673.980705] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1673.981127] copy_process+0x3285/0x7800 [ 1673.981447] ? __lock_acquire+0xbb1/0x5b00 [ 1673.981774] ? lock_downgrade+0x6d0/0x6d0 [ 1673.982103] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1673.982529] ? __cleanup_sighand+0xb0/0xb0 [ 1673.982850] ? lock_acquire+0x197/0x470 [ 1673.983170] ? find_held_lock+0x2c/0x110 [ 1673.983483] kernel_clone+0xe7/0x980 [ 1673.983792] ? lock_downgrade+0x6d0/0x6d0 [ 1673.984103] ? find_held_lock+0x2c/0x110 [ 1673.984407] ? create_io_thread+0xf0/0xf0 [ 1673.984720] ? ksys_write+0x12d/0x260 [ 1673.985013] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1673.985398] __do_sys_fork+0x8a/0xc0 [ 1673.985677] ? kernel_thread+0xf0/0xf0 [ 1673.985978] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1673.986397] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1673.986785] ? trace_hardirqs_on+0x5b/0x180 [ 1673.987131] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1673.987543] do_syscall_64+0x33/0x40 [ 1673.987833] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1673.988243] RIP: 0033:0x7fad5d41ab19 [ 1673.988530] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1673.990024] RSP: 002b:00007fad5a990188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1673.990594] RAX: ffffffffffffffda RBX: 00007fad5d52df60 RCX: 00007fad5d41ab19 [ 1673.991127] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1673.991672] RBP: 00007fad5a9901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1673.992202] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1673.992739] R13: 00007ffd7aa50c3f R14: 00007fad5a990300 R15: 0000000000022000 [ 1674.009560] FAULT_INJECTION: forcing a failure. [ 1674.009560] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 1674.010530] CPU: 1 PID: 15587 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1674.011079] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1674.011870] Call Trace: [ 1674.012177] dump_stack+0x107/0x167 [ 1674.012457] should_fail.cold+0x5/0xa [ 1674.012748] strncpy_from_user+0x34/0x470 [ 1674.013069] getname_flags.part.0+0x95/0x4f0 [ 1674.013401] getname_flags+0x9a/0xe0 [ 1674.013678] do_mkdirat+0x8f/0x2b0 [ 1674.013946] ? user_path_create+0xf0/0xf0 [ 1674.014262] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1674.014657] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1674.015043] do_syscall_64+0x33/0x40 [ 1674.015321] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1674.015706] RIP: 0033:0x7f168586fc27 [ 1674.015984] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1674.017332] RSP: 002b:00007f1682de5fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1674.017898] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f168586fc27 [ 1674.018445] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 1674.018970] RBP: 00007f1682de6040 R08: 0000000000000000 R09: 0000000000020020 [ 1674.019508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000040 [ 1674.020041] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 11:35:20 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 3) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:35:20 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:35:20 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, 0x0) 11:35:20 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 2) 11:35:20 executing program 7: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() (fail_nth: 3) 11:35:20 executing program 3: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) fork() (fail_nth: 1) 11:35:21 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:35:21 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 3) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) [ 1674.045527] FAULT_INJECTION: forcing a failure. [ 1674.045527] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1674.046649] CPU: 1 PID: 15590 Comm: syz-executor.5 Not tainted 5.10.209 #1 [ 1674.047290] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1674.048073] Call Trace: [ 1674.048286] dump_stack+0x107/0x167 [ 1674.048577] should_fail.cold+0x5/0xa [ 1674.048882] strncpy_from_user+0x34/0x470 [ 1674.049329] getname_flags.part.0+0x95/0x4f0 [ 1674.049801] getname_flags+0x9a/0xe0 [ 1674.050088] do_mkdirat+0x8f/0x2b0 [ 1674.050355] ? user_path_create+0xf0/0xf0 [ 1674.050667] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1674.051060] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1674.051607] do_syscall_64+0x33/0x40 [ 1674.051930] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1674.052402] RIP: 0033:0x7f209636fc27 [ 1674.052720] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1674.054450] RSP: 002b:00007f20938e5fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1674.055129] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f209636fc27 [ 1674.055851] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 1674.056482] RBP: 00007f20938e6040 R08: 0000000000000000 R09: 0000000000020020 [ 1674.057216] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000040 [ 1674.057848] R13: 00000000200000c0 R14: 00007f20938e6000 R15: 00000000200002c0 [ 1674.059699] FAULT_INJECTION: forcing a failure. [ 1674.059699] name failslab, interval 1, probability 0, space 0, times 0 [ 1674.061777] CPU: 0 PID: 15579 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1674.062899] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1674.064242] Call Trace: [ 1674.064686] dump_stack+0x107/0x167 [ 1674.065290] should_fail.cold+0x5/0xa [ 1674.065919] ? create_object.isra.0+0x3a/0xa20 [ 1674.066667] should_failslab+0x5/0x20 [ 1674.067292] kmem_cache_alloc+0x5b/0x310 [ 1674.067971] create_object.isra.0+0x3a/0xa20 [ 1674.068676] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1674.069812] kmem_cache_alloc_node+0x169/0x330 [ 1674.070538] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1674.071583] copy_process+0x3285/0x7800 [ 1674.072229] ? __lock_acquire+0xbb1/0x5b00 [ 1674.072904] ? lock_downgrade+0x6d0/0x6d0 [ 1674.073729] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1674.074634] ? __cleanup_sighand+0xb0/0xb0 [ 1674.075475] ? lock_acquire+0x197/0x470 [ 1674.076182] ? find_held_lock+0x2c/0x110 [ 1674.076993] kernel_clone+0xe7/0x980 [ 1674.077640] ? lock_downgrade+0x6d0/0x6d0 [ 1674.078459] ? find_held_lock+0x2c/0x110 [ 1674.079102] ? create_io_thread+0xf0/0xf0 [ 1674.080082] ? ksys_write+0x12d/0x260 [ 1674.080798] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1674.081689] __do_sys_fork+0x8a/0xc0 [ 1674.082370] ? kernel_thread+0xf0/0xf0 [ 1674.083063] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1674.084044] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1674.084894] ? trace_hardirqs_on+0x5b/0x180 [ 1674.085585] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1674.086380] do_syscall_64+0x33/0x40 [ 1674.086977] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1674.087802] RIP: 0033:0x7fe69fe62b19 [ 1674.088404] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1674.091320] RSP: 002b:00007fe69d3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1674.092540] RAX: ffffffffffffffda RBX: 00007fe69ff75f60 RCX: 00007fe69fe62b19 [ 1674.093673] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1674.094810] RBP: 00007fe69d3d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1674.095951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1674.097094] R13: 00007ffffc31f9df R14: 00007fe69d3d8300 R15: 0000000000022000 [ 1674.144695] FAULT_INJECTION: forcing a failure. [ 1674.144695] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1674.146064] CPU: 1 PID: 15611 Comm: syz-executor.7 Not tainted 5.10.209 #1 [ 1674.146613] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1674.147289] Call Trace: [ 1674.147522] dump_stack+0x107/0x167 [ 1674.147828] should_fail.cold+0x5/0xa [ 1674.148142] __alloc_pages_nodemask+0x182/0x600 [ 1674.148523] ? lock_downgrade+0x6d0/0x6d0 [ 1674.148856] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 1674.149342] ? memcg_slab_post_alloc_hook+0x17a/0x430 [ 1674.149740] ? kmem_cache_alloc_node+0x2bc/0x330 [ 1674.150101] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1674.150549] copy_process+0x618/0x7800 [ 1674.150864] ? __lock_acquire+0xbb1/0x5b00 [ 1674.151210] ? lock_downgrade+0x6d0/0x6d0 [ 1674.151573] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1674.152024] ? __cleanup_sighand+0xb0/0xb0 [ 1674.152387] ? lock_acquire+0x197/0x470 [ 1674.152750] ? find_held_lock+0x2c/0x110 [ 1674.153109] kernel_clone+0xe7/0x980 [ 1674.153396] ? lock_downgrade+0x6d0/0x6d0 [ 1674.153768] ? find_held_lock+0x2c/0x110 [ 1674.154119] ? create_io_thread+0xf0/0xf0 [ 1674.154470] ? ksys_write+0x12d/0x260 [ 1674.154812] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1674.155223] __do_sys_fork+0x8a/0xc0 [ 1674.155515] ? kernel_thread+0xf0/0xf0 [ 1674.155867] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1674.156304] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1674.156705] ? trace_hardirqs_on+0x5b/0x180 [ 1674.157075] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1674.157475] do_syscall_64+0x33/0x40 [ 1674.157789] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1674.158183] RIP: 0033:0x7ff0c2928b19 [ 1674.158509] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1674.160016] RSP: 002b:00007ff0bfe9e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1674.160641] RAX: ffffffffffffffda RBX: 00007ff0c2a3bf60 RCX: 00007ff0c2928b19 [ 1674.161214] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1674.161787] RBP: 00007ff0bfe9e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1674.162363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1674.162947] R13: 00007ffe877d9f7f R14: 00007ff0bfe9e300 R15: 0000000000022000 11:35:21 executing program 3: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) fork() (fail_nth: 2) 11:35:21 executing program 7: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() (fail_nth: 4) 11:35:21 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x4, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:35:21 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, 0x0) 11:35:21 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 4) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:35:21 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 4) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) [ 1674.293212] FAULT_INJECTION: forcing a failure. [ 1674.293212] name failslab, interval 1, probability 0, space 0, times 0 [ 1674.294366] CPU: 1 PID: 15797 Comm: syz-executor.7 Not tainted 5.10.209 #1 [ 1674.295065] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1674.295969] Call Trace: [ 1674.296247] dump_stack+0x107/0x167 [ 1674.296550] should_fail.cold+0x5/0xa [ 1674.296999] ? prepare_creds+0x25/0x5e0 [ 1674.297447] should_failslab+0x5/0x20 [ 1674.297794] kmem_cache_alloc+0x5b/0x310 [ 1674.298211] ? lock_downgrade+0x6d0/0x6d0 [ 1674.298631] prepare_creds+0x25/0x5e0 [ 1674.298998] copy_creds+0x72/0x580 [ 1674.299291] copy_process+0xfdc/0x7800 [ 1674.299603] ? __lock_acquire+0xbb1/0x5b00 [ 1674.299963] ? lock_downgrade+0x6d0/0x6d0 [ 1674.300299] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1674.300725] ? __cleanup_sighand+0xb0/0xb0 [ 1674.301162] ? lock_acquire+0x197/0x470 [ 1674.301594] ? find_held_lock+0x2c/0x110 [ 1674.301991] kernel_clone+0xe7/0x980 [ 1674.302292] ? lock_downgrade+0x6d0/0x6d0 [ 1674.302624] ? find_held_lock+0x2c/0x110 [ 1674.302953] ? create_io_thread+0xf0/0xf0 [ 1674.303287] ? ksys_write+0x12d/0x260 [ 1674.303600] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1674.304000] __do_sys_fork+0x8a/0xc0 [ 1674.304302] ? kernel_thread+0xf0/0xf0 [ 1674.304623] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1674.305049] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1674.305614] ? trace_hardirqs_on+0x5b/0x180 [ 1674.306126] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1674.306673] do_syscall_64+0x33/0x40 [ 1674.307064] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1674.307531] RIP: 0033:0x7ff0c2928b19 [ 1674.307840] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1674.309299] RSP: 002b:00007ff0bfe9e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1674.310076] RAX: ffffffffffffffda RBX: 00007ff0c2a3bf60 RCX: 00007ff0c2928b19 [ 1674.310849] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1674.311630] RBP: 00007ff0bfe9e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1674.312368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1674.312942] R13: 00007ffe877d9f7f R14: 00007ff0bfe9e300 R15: 0000000000022000 [ 1674.318512] FAULT_INJECTION: forcing a failure. [ 1674.318512] name failslab, interval 1, probability 0, space 0, times 0 [ 1674.319623] CPU: 1 PID: 15802 Comm: syz-executor.5 Not tainted 5.10.209 #1 [ 1674.320403] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1674.321246] Call Trace: [ 1674.321564] dump_stack+0x107/0x167 [ 1674.321911] should_fail.cold+0x5/0xa [ 1674.322335] should_failslab+0x5/0x20 [ 1674.322716] __kmalloc_track_caller+0x79/0x370 [ 1674.323157] ? strndup_user+0x74/0xe0 [ 1674.323571] ? clockevents_program_event+0x131/0x360 [ 1674.324053] memdup_user+0x22/0xd0 [ 1674.324418] strndup_user+0x74/0xe0 [ 1674.324759] __x64_sys_mount+0x133/0x300 [ 1674.325153] ? copy_mnt_ns+0xa00/0xa00 [ 1674.325483] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1674.325865] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1674.326281] do_syscall_64+0x33/0x40 [ 1674.326553] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1674.326961] RIP: 0033:0x7f209637204a [ 1674.327236] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1674.328995] RSP: 002b:00007f20938e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1674.329572] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f209637204a [ 1674.330370] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1674.330945] RBP: 00007f20938e6040 R08: 00007f20938e6040 R09: 0000000020000040 [ 1674.331510] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1674.332090] R13: 00000000200000c0 R14: 00007f20938e6000 R15: 00000000200002c0 11:35:21 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 3) [ 1674.387260] FAULT_INJECTION: forcing a failure. [ 1674.387260] name failslab, interval 1, probability 0, space 0, times 0 [ 1674.388586] CPU: 1 PID: 15803 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1674.389219] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1674.389939] Call Trace: [ 1674.390174] dump_stack+0x107/0x167 [ 1674.390637] should_fail.cold+0x5/0xa [ 1674.390975] should_failslab+0x5/0x20 [ 1674.391336] __kmalloc_track_caller+0x79/0x370 [ 1674.391798] ? strndup_user+0x74/0xe0 [ 1674.392090] ? getname_flags.part.0+0x1dd/0x4f0 [ 1674.392482] memdup_user+0x22/0xd0 [ 1674.392866] strndup_user+0x74/0xe0 [ 1674.393165] __x64_sys_mount+0x133/0x300 [ 1674.393495] ? copy_mnt_ns+0xa00/0xa00 [ 1674.393908] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1674.394338] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1674.394840] do_syscall_64+0x33/0x40 [ 1674.395141] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1674.395514] RIP: 0033:0x7f168587204a [ 1674.395859] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1674.397388] RSP: 002b:00007f1682de5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1674.398120] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f168587204a [ 1674.398634] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1674.399252] RBP: 00007f1682de6040 R08: 00007f1682de6040 R09: 0000000020000040 [ 1674.399783] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1674.400304] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 11:35:21 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x10, 0x0, 0x0, 0x4}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) pread64(r4, &(0x7f0000000180)=""/93, 0x5d, 0x3) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() [ 1674.425643] FAULT_INJECTION: forcing a failure. [ 1674.425643] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1674.427050] CPU: 1 PID: 15867 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1674.427601] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1674.428269] Call Trace: [ 1674.428488] dump_stack+0x107/0x167 [ 1674.428786] should_fail.cold+0x5/0xa [ 1674.429099] __alloc_pages_nodemask+0x182/0x600 [ 1674.429478] ? lock_downgrade+0x6d0/0x6d0 [ 1674.429814] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 1674.430298] ? memcg_slab_post_alloc_hook+0x17a/0x430 [ 1674.430715] ? kmem_cache_alloc_node+0x2bc/0x330 [ 1674.431093] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1674.431519] copy_process+0x618/0x7800 [ 1674.431845] ? __lock_acquire+0xbb1/0x5b00 [ 1674.432195] ? lock_downgrade+0x6d0/0x6d0 [ 1674.432524] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1674.432951] ? __cleanup_sighand+0xb0/0xb0 [ 1674.433295] ? lock_acquire+0x197/0x470 [ 1674.433624] ? find_held_lock+0x2c/0x110 [ 1674.433956] kernel_clone+0xe7/0x980 [ 1674.434260] ? lock_downgrade+0x6d0/0x6d0 [ 1674.434592] ? find_held_lock+0x2c/0x110 [ 1674.434919] ? create_io_thread+0xf0/0xf0 [ 1674.435260] ? ksys_write+0x12d/0x260 [ 1674.435571] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1674.435966] __do_sys_fork+0x8a/0xc0 [ 1674.436269] ? kernel_thread+0xf0/0xf0 [ 1674.436591] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1674.437011] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1674.437423] ? trace_hardirqs_on+0x5b/0x180 [ 1674.437768] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1674.438184] do_syscall_64+0x33/0x40 [ 1674.438482] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1674.438892] RIP: 0033:0x7fe69fe62b19 [ 1674.439193] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1674.440665] RSP: 002b:00007fe69d3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1674.441274] RAX: ffffffffffffffda RBX: 00007fe69ff75f60 RCX: 00007fe69fe62b19 [ 1674.441840] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1674.442408] RBP: 00007fe69d3d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1674.442976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1674.443546] R13: 00007ffffc31f9df R14: 00007fe69d3d8300 R15: 0000000000022000 11:35:21 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, 0x0) 11:35:36 executing program 3: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) fork() 11:35:36 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 5) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:35:36 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x722e}}, './file0\x00'}) 11:35:36 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x18, 0x100, 0x70bd28, 0x25dfdbfb, {0xa}, [@typed={0x8, 0x88, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x25, 0x0, 0x0, @fd=r5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000010}, 0x40800) r6 = syz_open_procfs(0x0, &(0x7f0000000180)='environ\x00') readv(r6, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) mmap$IORING_OFF_SQES(&(0x7f0000a91000/0x3000)=nil, 0x3000, 0x2000001, 0x10010, r6, 0x10000000) fork() r7 = perf_event_open$cgroup(&(0x7f00000001c0)={0x1, 0x80, 0x7, 0x7, 0x6, 0x92, 0x0, 0x8000, 0x60009, 0xb, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x4, @perf_bp={&(0x7f0000000180)}, 0x8, 0x1, 0x8a, 0x0, 0x19, 0x101, 0x7, 0x0, 0xffff, 0x0, 0x8000}, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, &(0x7f0000000240)=0xac) 11:35:36 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 5) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:35:36 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 4) 11:35:36 executing program 7: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() (fail_nth: 5) 11:35:36 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x5, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) [ 1689.130767] FAULT_INJECTION: forcing a failure. [ 1689.130767] name failslab, interval 1, probability 0, space 0, times 0 [ 1689.132077] CPU: 0 PID: 16130 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1689.132683] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1689.133423] Call Trace: [ 1689.133664] dump_stack+0x107/0x167 [ 1689.133988] should_fail.cold+0x5/0xa [ 1689.134328] ? prepare_creds+0x25/0x5e0 [ 1689.134679] should_failslab+0x5/0x20 [ 1689.135019] kmem_cache_alloc+0x5b/0x310 [ 1689.135382] ? lock_downgrade+0x6d0/0x6d0 [ 1689.135751] prepare_creds+0x25/0x5e0 [ 1689.136101] copy_creds+0x72/0x580 [ 1689.136425] copy_process+0xfdc/0x7800 [ 1689.136774] ? __lock_acquire+0xbb1/0x5b00 [ 1689.137157] ? lock_downgrade+0x6d0/0x6d0 [ 1689.137531] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1689.138004] ? __cleanup_sighand+0xb0/0xb0 [ 1689.138382] ? lock_acquire+0x197/0x470 [ 1689.138734] ? find_held_lock+0x2c/0x110 [ 1689.139098] kernel_clone+0xe7/0x980 [ 1689.139427] ? lock_downgrade+0x6d0/0x6d0 [ 1689.139793] ? find_held_lock+0x2c/0x110 [ 1689.140163] ? create_io_thread+0xf0/0xf0 [ 1689.140532] ? ksys_write+0x12d/0x260 [ 1689.140878] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1689.141310] __do_sys_fork+0x8a/0xc0 [ 1689.141640] ? kernel_thread+0xf0/0xf0 [ 1689.142003] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1689.142468] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1689.142917] ? trace_hardirqs_on+0x5b/0x180 [ 1689.143301] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1689.143753] do_syscall_64+0x33/0x40 [ 1689.144093] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1689.144544] RIP: 0033:0x7fe69fe62b19 [ 1689.144878] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1689.146480] RSP: 002b:00007fe69d3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1689.147146] RAX: ffffffffffffffda RBX: 00007fe69ff75f60 RCX: 00007fe69fe62b19 [ 1689.147767] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1689.148398] RBP: 00007fe69d3d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1689.149018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1689.149646] R13: 00007ffffc31f9df R14: 00007fe69d3d8300 R15: 0000000000022000 [ 1689.198230] FAULT_INJECTION: forcing a failure. [ 1689.198230] name failslab, interval 1, probability 0, space 0, times 0 [ 1689.200563] CPU: 1 PID: 16122 Comm: syz-executor.7 Not tainted 5.10.209 #1 [ 1689.201712] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1689.203067] Call Trace: [ 1689.203473] dump_stack+0x107/0x167 [ 1689.204020] should_fail.cold+0x5/0xa [ 1689.204588] ? create_object.isra.0+0x3a/0xa20 [ 1689.205277] should_failslab+0x5/0x20 [ 1689.205909] kmem_cache_alloc+0x5b/0x310 [ 1689.206585] create_object.isra.0+0x3a/0xa20 [ 1689.207319] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1689.208117] kmem_cache_alloc+0x159/0x310 [ 1689.208737] prepare_creds+0x25/0x5e0 [ 1689.209330] copy_creds+0x72/0x580 [ 1689.209931] copy_process+0xfdc/0x7800 [ 1689.210580] ? __lock_acquire+0xbb1/0x5b00 [ 1689.211292] ? lock_downgrade+0x6d0/0x6d0 [ 1689.211990] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1689.212788] ? __cleanup_sighand+0xb0/0xb0 [ 1689.213451] ? lock_acquire+0x197/0x470 [ 1689.214118] ? find_held_lock+0x2c/0x110 [ 1689.214791] kernel_clone+0xe7/0x980 [ 1689.215383] ? lock_downgrade+0x6d0/0x6d0 [ 1689.215994] ? find_held_lock+0x2c/0x110 [ 1689.216590] ? create_io_thread+0xf0/0xf0 [ 1689.217202] ? ksys_write+0x12d/0x260 [ 1689.217768] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1689.218472] __do_sys_fork+0x8a/0xc0 [ 1689.219021] ? kernel_thread+0xf0/0xf0 [ 1689.219604] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1689.220378] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1689.221123] ? trace_hardirqs_on+0x5b/0x180 [ 1689.221757] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1689.222510] do_syscall_64+0x33/0x40 [ 1689.223055] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1689.223792] RIP: 0033:0x7ff0c2928b19 [ 1689.224349] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1689.226995] RSP: 002b:00007ff0bfe9e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1689.228108] RAX: ffffffffffffffda RBX: 00007ff0c2a3bf60 RCX: 00007ff0c2928b19 [ 1689.229141] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1689.230179] RBP: 00007ff0bfe9e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1689.231198] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1689.232245] R13: 00007ffe877d9f7f R14: 00007ff0bfe9e300 R15: 0000000000022000 [ 1689.261458] FAULT_INJECTION: forcing a failure. [ 1689.261458] name failslab, interval 1, probability 0, space 0, times 0 [ 1689.262481] CPU: 0 PID: 16134 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1689.263045] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1689.263728] Call Trace: [ 1689.263980] dump_stack+0x107/0x167 [ 1689.264317] should_fail.cold+0x5/0xa [ 1689.264662] ? create_object.isra.0+0x3a/0xa20 [ 1689.265077] should_failslab+0x5/0x20 [ 1689.265414] kmem_cache_alloc+0x5b/0x310 [ 1689.265755] create_object.isra.0+0x3a/0xa20 [ 1689.266122] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1689.266555] __kmalloc_track_caller+0x177/0x370 [ 1689.266945] ? strndup_user+0x74/0xe0 [ 1689.267269] ? getname_flags.part.0+0x1dd/0x4f0 [ 1689.267659] memdup_user+0x22/0xd0 [ 1689.267970] strndup_user+0x74/0xe0 [ 1689.268284] __x64_sys_mount+0x133/0x300 [ 1689.268463] FAULT_INJECTION: forcing a failure. [ 1689.268463] name failslab, interval 1, probability 0, space 0, times 0 [ 1689.268630] ? copy_mnt_ns+0xa00/0xa00 [ 1689.270563] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1689.271003] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1689.271439] do_syscall_64+0x33/0x40 [ 1689.271749] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1689.272192] RIP: 0033:0x7f168587204a [ 1689.272503] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1689.274024] RSP: 002b:00007f1682de5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1689.274653] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f168587204a [ 1689.275247] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1689.275849] RBP: 00007f1682de6040 R08: 00007f1682de6040 R09: 0000000020000040 [ 1689.276445] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1689.277033] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 [ 1689.277637] CPU: 1 PID: 16135 Comm: syz-executor.5 Not tainted 5.10.209 #1 [ 1689.278684] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1689.279899] Call Trace: [ 1689.280297] dump_stack+0x107/0x167 [ 1689.280847] should_fail.cold+0x5/0xa [ 1689.281417] ? create_object.isra.0+0x3a/0xa20 [ 1689.282096] should_failslab+0x5/0x20 [ 1689.282665] kmem_cache_alloc+0x5b/0x310 [ 1689.283276] create_object.isra.0+0x3a/0xa20 [ 1689.283936] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1689.284691] __kmalloc_track_caller+0x177/0x370 [ 1689.285376] ? strndup_user+0x74/0xe0 [ 1689.285937] ? getname_flags.part.0+0x1dd/0x4f0 [ 1689.286634] memdup_user+0x22/0xd0 [ 1689.287180] strndup_user+0x74/0xe0 [ 1689.287731] __x64_sys_mount+0x133/0x300 [ 1689.288328] ? copy_mnt_ns+0xa00/0xa00 [ 1689.288903] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1689.289686] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1689.290462] do_syscall_64+0x33/0x40 [ 1689.291014] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1689.291777] RIP: 0033:0x7f209637204a [ 1689.292354] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1689.295061] RSP: 002b:00007f20938e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1689.296173] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f209637204a [ 1689.297226] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1689.298272] RBP: 00007f20938e6040 R08: 00007f20938e6040 R09: 0000000020000040 [ 1689.299319] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1689.300364] R13: 00000000200000c0 R14: 00007f20938e6000 R15: 00000000200002c0 11:35:36 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 5) 11:35:36 executing program 3: syz_io_uring_setup(0x26d3, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f00001bc000/0x3000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) fork() [ 1689.425802] FAULT_INJECTION: forcing a failure. [ 1689.425802] name failslab, interval 1, probability 0, space 0, times 0 [ 1689.427099] CPU: 0 PID: 16374 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1689.427750] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1689.428415] Call Trace: [ 1689.428633] dump_stack+0x107/0x167 [ 1689.428923] should_fail.cold+0x5/0xa [ 1689.429226] ? create_object.isra.0+0x3a/0xa20 [ 1689.429589] should_failslab+0x5/0x20 [ 1689.429892] kmem_cache_alloc+0x5b/0x310 [ 1689.430215] ? prepare_creds+0x25/0x5e0 [ 1689.430534] create_object.isra.0+0x3a/0xa20 [ 1689.430883] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1689.431286] kmem_cache_alloc+0x159/0x310 [ 1689.431624] prepare_creds+0x25/0x5e0 [ 1689.431945] copy_creds+0x72/0x580 [ 1689.432232] copy_process+0xfdc/0x7800 [ 1689.432544] ? __lock_acquire+0xbb1/0x5b00 [ 1689.432887] ? lock_downgrade+0x6d0/0x6d0 [ 1689.433222] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1689.433641] ? __cleanup_sighand+0xb0/0xb0 [ 1689.433980] ? lock_acquire+0x197/0x470 [ 1689.434302] ? find_held_lock+0x2c/0x110 [ 1689.434635] kernel_clone+0xe7/0x980 [ 1689.434929] ? lock_downgrade+0x6d0/0x6d0 [ 1689.435260] ? find_held_lock+0x2c/0x110 [ 1689.435583] ? create_io_thread+0xf0/0xf0 [ 1689.435931] ? ksys_write+0x12d/0x260 [ 1689.436246] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1689.436630] __do_sys_fork+0x8a/0xc0 [ 1689.436936] ? kernel_thread+0xf0/0xf0 [ 1689.437260] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1689.437674] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1689.438090] ? trace_hardirqs_on+0x5b/0x180 [ 1689.438431] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1689.438842] do_syscall_64+0x33/0x40 [ 1689.439143] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1689.439549] RIP: 0033:0x7fe69fe62b19 [ 1689.439859] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1689.441294] RSP: 002b:00007fe69d3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1689.441896] RAX: ffffffffffffffda RBX: 00007fe69ff75f60 RCX: 00007fe69fe62b19 [ 1689.442455] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1689.443016] RBP: 00007fe69d3d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1689.443575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1689.444188] R13: 00007ffffc31f9df R14: 00007fe69d3d8300 R15: 0000000000022000 11:35:50 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 6) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:35:50 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:35:50 executing program 7: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() (fail_nth: 6) 11:35:50 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x722e}}, './file0\x00'}) 11:35:50 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 6) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:35:50 executing program 3: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xe0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) fork() 11:35:50 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 6) [ 1703.455437] FAULT_INJECTION: forcing a failure. [ 1703.455437] name failslab, interval 1, probability 0, space 0, times 0 [ 1703.456541] CPU: 0 PID: 16554 Comm: syz-executor.7 Not tainted 5.10.209 #1 [ 1703.457122] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1703.457766] Call Trace: [ 1703.457992] dump_stack+0x107/0x167 [ 1703.458287] should_fail.cold+0x5/0xa [ 1703.458587] ? security_prepare_creds+0x112/0x190 [ 1703.458980] should_failslab+0x5/0x20 [ 1703.459291] __kmalloc+0x72/0x390 [ 1703.459579] security_prepare_creds+0x112/0x190 [ 1703.459964] prepare_creds+0x452/0x5e0 [ 1703.460304] copy_creds+0x72/0x580 [ 1703.460599] copy_process+0xfdc/0x7800 [ 1703.460922] ? __lock_acquire+0xbb1/0x5b00 [ 1703.461269] ? lock_downgrade+0x6d0/0x6d0 [ 1703.461693] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1703.462162] ? __cleanup_sighand+0xb0/0xb0 [ 1703.462510] ? lock_acquire+0x197/0x470 [ 1703.462841] ? find_held_lock+0x2c/0x110 [ 1703.463186] kernel_clone+0xe7/0x980 [ 1703.463497] ? lock_downgrade+0x6d0/0x6d0 [ 1703.463849] ? find_held_lock+0x2c/0x110 [ 1703.464205] ? create_io_thread+0xf0/0xf0 [ 1703.464560] ? ksys_write+0x12d/0x260 [ 1703.464889] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1703.465310] __do_sys_fork+0x8a/0xc0 [ 1703.465630] ? kernel_thread+0xf0/0xf0 [ 1703.465972] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1703.466423] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1703.466842] ? trace_hardirqs_on+0x5b/0x180 [ 1703.467203] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1703.467631] do_syscall_64+0x33/0x40 [ 1703.467945] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1703.468398] RIP: 0033:0x7ff0c2928b19 [ 1703.468715] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1703.470165] RSP: 002b:00007ff0bfe9e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1703.470789] RAX: ffffffffffffffda RBX: 00007ff0c2a3bf60 RCX: 00007ff0c2928b19 [ 1703.471396] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1703.471997] RBP: 00007ff0bfe9e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1703.472562] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1703.473116] R13: 00007ffe877d9f7f R14: 00007ff0bfe9e300 R15: 0000000000022000 11:35:50 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x20, 0x0, 0xffffffff}, &(0x7f00000a0000)=nil, &(0x7f0000916000/0xa000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r1, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x4, 0x0, @fd_index=0xa, 0x0, 0x0, 0x0, {0x28}}, 0x4) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000180)='environ\x00') readv(r5, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000240)={'ip6tnl0\x00', &(0x7f00000001c0)={'sit0\x00', 0x0, 0x0, 0x9, 0x2, 0x1, 0x44, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x2d}}, 0x80, 0x7, 0xff, 0xfffffff8}}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) r7 = dup3(0xffffffffffffffff, r2, 0x80000) sendmsg$NL80211_CMD_SET_QOS_MAP(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f00000015c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="01000000000000a26c39dbc316fdda49b48bef0000007500000008000300", @ANYRES32=0x0, @ANYBLOB="77a90b6943d36b045dafc4fff802582e336b81c8867ce848ae7c525e576f2e8f64b6f4b4640c024be83a74c105cd8f45e66e393ff5e4aaa194d4c79b52b8fc2c6ed84d"], 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f0000000380)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000014c0)={&(0x7f00000003c0)={0xf8, 0x0, 0x10, 0x70bd27, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r8}, @void}}, [@mon_options=[@NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @broadcast}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @broadcast}], @NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}, @NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}, @NL80211_ATTR_MESH_ID={0xa}, @mon_options=[@NL80211_ATTR_MNTR_FLAGS={0x20, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}]}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "4a866ff24c481c39a2cf2227f1c6779396ae47537b411bea"}, @NL80211_ATTR_MNTR_FLAGS={0x14, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}]}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @device_b}, @NL80211_ATTR_MNTR_FLAGS={0xc, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}]}, @NL80211_ATTR_MNTR_FLAGS={0x8, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_COOK_FRAMES={0x4}]}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @broadcast}, @NL80211_ATTR_MNTR_FLAGS={0x2c, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_COOK_FRAMES={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_COOK_FRAMES={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}]}]]}, 0xf8}, 0x1, 0x0, 0x0, 0xa004}, 0x10000000) setsockopt$sock_timeval(r7, 0x1, 0x15, &(0x7f0000000180)={0x0, 0x2710}, 0x10) fork() [ 1703.521380] FAULT_INJECTION: forcing a failure. [ 1703.521380] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1703.522436] CPU: 0 PID: 16556 Comm: syz-executor.5 Not tainted 5.10.209 #1 [ 1703.523025] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1703.523687] Call Trace: [ 1703.523913] dump_stack+0x107/0x167 [ 1703.524207] should_fail.cold+0x5/0xa [ 1703.524532] _copy_from_user+0x2e/0x1b0 [ 1703.524874] memdup_user+0x65/0xd0 [ 1703.525175] strndup_user+0x74/0xe0 [ 1703.525472] __x64_sys_mount+0x133/0x300 [ 1703.525810] ? copy_mnt_ns+0xa00/0xa00 [ 1703.526108] FAULT_INJECTION: forcing a failure. [ 1703.526108] name failslab, interval 1, probability 0, space 0, times 0 [ 1703.526952] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1703.527378] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1703.527790] do_syscall_64+0x33/0x40 [ 1703.528114] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1703.528530] RIP: 0033:0x7f209637204a [ 1703.528810] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1703.530246] RSP: 002b:00007f20938e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1703.530861] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f209637204a [ 1703.531406] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1703.531979] RBP: 00007f20938e6040 R08: 00007f20938e6040 R09: 0000000020000040 [ 1703.532564] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1703.533136] R13: 00000000200000c0 R14: 00007f20938e6000 R15: 00000000200002c0 [ 1703.533694] CPU: 1 PID: 16560 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1703.534899] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1703.536218] Call Trace: [ 1703.536690] dump_stack+0x107/0x167 [ 1703.537460] should_fail.cold+0x5/0xa [ 1703.538196] ? security_prepare_creds+0x112/0x190 [ 1703.539069] should_failslab+0x5/0x20 [ 1703.539654] __kmalloc+0x72/0x390 [ 1703.540219] security_prepare_creds+0x112/0x190 [ 1703.540975] prepare_creds+0x452/0x5e0 [ 1703.541725] copy_creds+0x72/0x580 [ 1703.542405] copy_process+0xfdc/0x7800 [ 1703.543210] ? visit_groups_merge.constprop.0.isra.0+0x771/0xae0 [ 1703.544286] ? __lock_acquire+0x1657/0x5b00 [ 1703.545117] ? __cleanup_sighand+0xb0/0xb0 [ 1703.545954] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1703.546979] ? trace_hardirqs_on+0x5b/0x180 [ 1703.547864] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1703.548906] ? kernel_clone+0x9f/0x980 [ 1703.549516] kernel_clone+0xe7/0x980 [ 1703.550101] ? create_io_thread+0xf0/0xf0 [ 1703.550927] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1703.552008] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1703.552899] ? trace_hardirqs_on+0x5b/0x180 [ 1703.553633] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1703.554322] ? finish_task_switch+0x126/0x5d0 [ 1703.555020] ? finish_task_switch+0xef/0x5d0 [ 1703.555730] ? __switch_to+0x572/0xf70 [ 1703.556345] ? __switch_to_asm+0x3a/0x60 [ 1703.557045] ? __switch_to_asm+0x34/0x60 [ 1703.557678] __do_sys_fork+0x8a/0xc0 [ 1703.558243] ? kernel_thread+0xf0/0xf0 [ 1703.558841] ? io_schedule_timeout+0x140/0x140 [ 1703.559560] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1703.560359] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1703.561146] ? trace_hardirqs_on+0x5b/0x180 [ 1703.561818] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1703.562615] do_syscall_64+0x33/0x40 [ 1703.563184] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1703.563960] RIP: 0033:0x7fe69fe62b19 [ 1703.564539] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1703.567378] RSP: 002b:00007fe69d3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1703.568551] RAX: ffffffffffffffda RBX: 00007fe69ff75f60 RCX: 00007fe69fe62b19 [ 1703.569657] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1703.570742] RBP: 00007fe69d3d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1703.571818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1703.572933] R13: 00007ffffc31f9df R14: 00007fe69d3d8300 R15: 0000000000022000 [ 1703.580175] FAULT_INJECTION: forcing a failure. [ 1703.580175] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1703.581201] CPU: 0 PID: 16561 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1703.581757] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1703.582392] Call Trace: [ 1703.582597] dump_stack+0x107/0x167 [ 1703.582895] should_fail.cold+0x5/0xa [ 1703.583196] _copy_from_user+0x2e/0x1b0 [ 1703.583501] memdup_user+0x65/0xd0 [ 1703.583773] strndup_user+0x74/0xe0 [ 1703.584081] __x64_sys_mount+0x133/0x300 [ 1703.584415] ? copy_mnt_ns+0xa00/0xa00 [ 1703.584728] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1703.585155] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1703.585575] do_syscall_64+0x33/0x40 [ 1703.585887] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1703.586277] RIP: 0033:0x7f168587204a [ 1703.586580] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1703.587998] RSP: 002b:00007f1682de5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1703.588589] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f168587204a [ 1703.589163] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1703.589755] RBP: 00007f1682de6040 R08: 00007f1682de6040 R09: 0000000020000040 [ 1703.590314] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1703.590845] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 11:35:50 executing program 7: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() (fail_nth: 7) 11:35:50 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x9, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:35:50 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 7) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:35:50 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 7) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) [ 1703.679522] FAULT_INJECTION: forcing a failure. [ 1703.679522] name failslab, interval 1, probability 0, space 0, times 0 [ 1703.680770] CPU: 0 PID: 16675 Comm: syz-executor.7 Not tainted 5.10.209 #1 [ 1703.681295] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1703.681976] Call Trace: [ 1703.682185] dump_stack+0x107/0x167 [ 1703.682490] should_fail.cold+0x5/0xa [ 1703.682804] ? create_object.isra.0+0x3a/0xa20 [ 1703.683179] should_failslab+0x5/0x20 [ 1703.683488] kmem_cache_alloc+0x5b/0x310 [ 1703.683828] create_object.isra.0+0x3a/0xa20 [ 1703.684202] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1703.684592] __kmalloc+0x16e/0x390 [ 1703.684895] security_prepare_creds+0x112/0x190 [ 1703.685284] prepare_creds+0x452/0x5e0 [ 1703.685579] copy_creds+0x72/0x580 [ 1703.685875] copy_process+0xfdc/0x7800 [ 1703.686183] ? __lock_acquire+0xbb1/0x5b00 [ 1703.686537] ? lock_downgrade+0x6d0/0x6d0 [ 1703.686866] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1703.687296] ? __cleanup_sighand+0xb0/0xb0 [ 1703.687645] ? lock_acquire+0x197/0x470 [ 1703.687955] ? find_held_lock+0x2c/0x110 [ 1703.688298] kernel_clone+0xe7/0x980 [ 1703.688580] ? lock_downgrade+0x6d0/0x6d0 [ 1703.688913] ? find_held_lock+0x2c/0x110 [ 1703.689247] ? create_io_thread+0xf0/0xf0 [ 1703.689593] ? ksys_write+0x12d/0x260 [ 1703.689912] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1703.690308] __do_sys_fork+0x8a/0xc0 [ 1703.690608] ? kernel_thread+0xf0/0xf0 [ 1703.690939] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1703.691364] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1703.691767] ? trace_hardirqs_on+0x5b/0x180 [ 1703.692125] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1703.692534] do_syscall_64+0x33/0x40 [ 1703.692841] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1703.693271] RIP: 0033:0x7ff0c2928b19 [ 1703.693560] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1703.695012] RSP: 002b:00007ff0bfe9e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1703.695625] RAX: ffffffffffffffda RBX: 00007ff0c2a3bf60 RCX: 00007ff0c2928b19 [ 1703.696203] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1703.696793] RBP: 00007ff0bfe9e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1703.697369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1703.697921] R13: 00007ffe877d9f7f R14: 00007ff0bfe9e300 R15: 0000000000022000 11:35:50 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x722e}}, './file0\x00'}) [ 1703.733225] FAULT_INJECTION: forcing a failure. [ 1703.733225] name failslab, interval 1, probability 0, space 0, times 0 [ 1703.734190] CPU: 0 PID: 16733 Comm: syz-executor.5 Not tainted 5.10.209 #1 [ 1703.734745] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1703.735402] Call Trace: [ 1703.735619] dump_stack+0x107/0x167 [ 1703.735904] should_fail.cold+0x5/0xa [ 1703.736230] ? copy_mount_options+0x55/0x180 [ 1703.736585] should_failslab+0x5/0x20 [ 1703.736891] kmem_cache_alloc_trace+0x55/0x320 [ 1703.737266] ? _copy_from_user+0xfb/0x1b0 [ 1703.737604] copy_mount_options+0x55/0x180 [ 1703.737960] __x64_sys_mount+0x1a8/0x300 [ 1703.738299] ? copy_mnt_ns+0xa00/0xa00 [ 1703.738622] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1703.739055] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1703.739476] do_syscall_64+0x33/0x40 [ 1703.739763] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1703.740184] RIP: 0033:0x7f209637204a [ 1703.740469] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1703.741956] RSP: 002b:00007f20938e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1703.742554] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f209637204a [ 1703.743100] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1703.743651] RBP: 00007f20938e6040 R08: 00007f20938e6040 R09: 0000000020000040 [ 1703.744208] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1703.744770] R13: 00000000200000c0 R14: 00007f20938e6000 R15: 00000000200002c0 11:35:50 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 8) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) [ 1703.806160] FAULT_INJECTION: forcing a failure. [ 1703.806160] name failslab, interval 1, probability 0, space 0, times 0 [ 1703.808022] CPU: 1 PID: 16765 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1703.808884] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1703.810127] Call Trace: [ 1703.810559] dump_stack+0x107/0x167 [ 1703.811024] should_fail.cold+0x5/0xa [ 1703.811500] ? copy_mount_options+0x55/0x180 [ 1703.812056] should_failslab+0x5/0x20 [ 1703.812533] kmem_cache_alloc_trace+0x55/0x320 [ 1703.813160] ? _copy_from_user+0xfb/0x1b0 [ 1703.813741] copy_mount_options+0x55/0x180 [ 1703.814309] __x64_sys_mount+0x1a8/0x300 [ 1703.814824] ? copy_mnt_ns+0xa00/0xa00 [ 1703.815310] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1703.816015] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1703.816671] do_syscall_64+0x33/0x40 [ 1703.817169] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1703.817838] RIP: 0033:0x7f168587204a [ 1703.818401] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1703.821241] RSP: 002b:00007f1682de5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1703.822421] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f168587204a [ 1703.823527] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1703.824635] RBP: 00007f1682de6040 R08: 00007f1682de6040 R09: 0000000020000040 [ 1703.825736] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1703.826794] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 [ 1703.828254] FAULT_INJECTION: forcing a failure. [ 1703.828254] name failslab, interval 1, probability 0, space 0, times 0 [ 1703.829462] CPU: 0 PID: 16780 Comm: syz-executor.5 Not tainted 5.10.209 #1 [ 1703.830048] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1703.830727] Call Trace: [ 1703.830949] dump_stack+0x107/0x167 [ 1703.831248] should_fail.cold+0x5/0xa [ 1703.831562] ? create_object.isra.0+0x3a/0xa20 [ 1703.831950] should_failslab+0x5/0x20 [ 1703.832273] kmem_cache_alloc+0x5b/0x310 [ 1703.832585] create_object.isra.0+0x3a/0xa20 [ 1703.832926] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1703.833315] kmem_cache_alloc_trace+0x151/0x320 [ 1703.833695] ? _copy_from_user+0xfb/0x1b0 [ 1703.834016] copy_mount_options+0x55/0x180 [ 1703.834359] __x64_sys_mount+0x1a8/0x300 [ 1703.834696] ? copy_mnt_ns+0xa00/0xa00 [ 1703.835027] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1703.835474] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1703.835879] do_syscall_64+0x33/0x40 [ 1703.836199] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1703.836601] RIP: 0033:0x7f209637204a [ 1703.836906] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1703.838340] RSP: 002b:00007f20938e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1703.838948] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f209637204a [ 1703.839564] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1703.840276] RBP: 00007f20938e6040 R08: 00007f20938e6040 R09: 0000000020000040 [ 1703.840859] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1703.841445] R13: 00000000200000c0 R14: 00007f20938e6000 R15: 00000000200002c0 11:35:50 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) 11:35:50 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 7) 11:35:50 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 8) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:35:51 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x10, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) [ 1704.030530] FAULT_INJECTION: forcing a failure. [ 1704.030530] name failslab, interval 1, probability 0, space 0, times 0 [ 1704.031701] CPU: 0 PID: 16985 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1704.032261] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1704.032944] Call Trace: [ 1704.033165] dump_stack+0x107/0x167 [ 1704.033462] should_fail.cold+0x5/0xa [ 1704.033761] ? create_object.isra.0+0x3a/0xa20 [ 1704.034134] should_failslab+0x5/0x20 [ 1704.034443] kmem_cache_alloc+0x5b/0x310 [ 1704.034786] create_object.isra.0+0x3a/0xa20 [ 1704.035142] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1704.035566] __kmalloc+0x16e/0x390 [ 1704.035867] security_prepare_creds+0x112/0x190 [ 1704.036268] prepare_creds+0x452/0x5e0 [ 1704.036582] copy_creds+0x72/0x580 [ 1704.036856] copy_process+0xfdc/0x7800 [ 1704.037271] ? __lock_acquire+0xbb1/0x5b00 [ 1704.037660] ? lock_downgrade+0x6d0/0x6d0 [ 1704.038013] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1704.038451] ? __cleanup_sighand+0xb0/0xb0 [ 1704.038788] ? lock_acquire+0x197/0x470 [ 1704.039122] ? find_held_lock+0x2c/0x110 [ 1704.039445] kernel_clone+0xe7/0x980 [ 1704.039755] ? lock_downgrade+0x6d0/0x6d0 [ 1704.040096] ? find_held_lock+0x2c/0x110 [ 1704.040429] ? create_io_thread+0xf0/0xf0 [ 1704.040769] FAULT_INJECTION: forcing a failure. [ 1704.040769] name failslab, interval 1, probability 0, space 0, times 0 [ 1704.040793] ? ksys_write+0x12d/0x260 [ 1704.042536] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1704.042912] __do_sys_fork+0x8a/0xc0 [ 1704.043217] ? kernel_thread+0xf0/0xf0 [ 1704.043520] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1704.043944] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1704.044348] ? trace_hardirqs_on+0x5b/0x180 [ 1704.044695] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1704.045103] do_syscall_64+0x33/0x40 [ 1704.045402] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1704.045814] RIP: 0033:0x7fe69fe62b19 [ 1704.046128] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1704.047501] RSP: 002b:00007fe69d3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1704.048135] RAX: ffffffffffffffda RBX: 00007fe69ff75f60 RCX: 00007fe69fe62b19 [ 1704.048705] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1704.049291] RBP: 00007fe69d3d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1704.049858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1704.050437] R13: 00007ffffc31f9df R14: 00007fe69d3d8300 R15: 0000000000022000 [ 1704.051057] CPU: 1 PID: 17035 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1704.051955] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1704.053035] Call Trace: [ 1704.053396] dump_stack+0x107/0x167 [ 1704.053851] should_fail.cold+0x5/0xa [ 1704.054328] ? create_object.isra.0+0x3a/0xa20 [ 1704.054896] should_failslab+0x5/0x20 [ 1704.055367] kmem_cache_alloc+0x5b/0x310 [ 1704.055874] create_object.isra.0+0x3a/0xa20 [ 1704.056452] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1704.057082] kmem_cache_alloc_trace+0x151/0x320 [ 1704.057669] copy_mount_options+0x55/0x180 [ 1704.058192] __x64_sys_mount+0x1a8/0x300 [ 1704.058693] ? copy_mnt_ns+0xa00/0xa00 [ 1704.059209] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1704.059901] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1704.060549] do_syscall_64+0x33/0x40 [ 1704.061031] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1704.061665] RIP: 0033:0x7f168587204a [ 1704.062160] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1704.064408] RSP: 002b:00007f1682de5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1704.065412] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f168587204a [ 1704.066339] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1704.067264] RBP: 00007f1682de6040 R08: 00007f1682de6040 R09: 0000000020000040 [ 1704.068204] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1704.069153] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 11:36:03 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 9) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:36:03 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 8) 11:36:03 executing program 3: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) r5 = mmap$IORING_OFF_SQES(&(0x7f0000495000/0x1000)=nil, 0x1000, 0x8, 0x50, r0, 0x10000000) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r5, &(0x7f0000000900)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, r2, 0x0, &(0x7f00000008c0)={&(0x7f0000000180)=@nfc_llcp={0x27, 0x0, 0x2, 0x1, 0x7, 0x20, "ce369144fb49ca793f6d592e9eec91c0a33e1244e0217858eac9dfeefbd4c22fa56481fc532c2ad165d3314a02645c03dc8c9b1243af6ae1613216eecc11db", 0x26}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000200)="184cd5f44f6ec47a833df7c7d95285617f14c934b64deb8baa934de02fbf04147acd9f25f5009240f138028361060579a6d58a3991088a404fd05ba7b47542d955510102a5a5264279dc557dd0e0549c744d1a200f333f6e5ce5b89866138cc6f85cead6ecc0d6a73089f89e9820dd0150a6e3b470ef5e7acb10b035840843397bbc7e09207fdcb109166c6d6bf0cd1ec2d2dc9a59b506", 0x97}, {&(0x7f0000000340)="5aad8530ec9afb290f600be6231aa7c3ed3fcf180c42300b327153131afd7612d67bad59c2ef76a0a46d0313465a8b1e9a364f0e9c67881c165fad05d4abd5eb8b09d1dc4d19478b3920c15d218d66e92536a17ba50d5b81d9a680b22266e34404066b", 0x63}, {&(0x7f00000003c0)="805db95511cbf9a1e1f630f70d130b7790870efb7a8a0d83b650576f2d1ac2154622842928feb98afc1a438c2d06e25880127b67aa4c57e9793d3f740aaba35a2e24f062e5230e8dbd61fddeba6f4b54753d8c9438a9f8907e310980046fd0653a6764f3621db421ef87b2b738cd170d616ad12e44d5ef3970ef60c9f1c5053ba2728119fde4b86744fe77c7", 0x8c}, {&(0x7f0000000480)="b5ef78c90fda49686c9957427867b00266411073ca8c567cb481e2484854f20300eb90ab7da9554fcc21b4601774619f4e643e9996d9c3d8739a0f80b364d75a3abf787a9785b45d04f24b91cb2fff36a9cae2c02f0d9570195176d58c86b2c7018eb04877d5e0159edcd308b21e54", 0x6f}, {&(0x7f0000000500)="74fae34699e1c046196afe250dba5a3618eaddc4e0028ae5dc40fb714c8165a52e73a0bc1dc920c89771d0c817e4a10342f74758ce623b864f466d5e93da13a28377d76b87d9f2fcbdeca9566bdeba48fb35cb99a55916cf02c9f91a6e0763a04b32dc03fd237bcd76f8e3d38ad15079049c1b404da85eb53c67e2773de192db0090c62ed616e0717372c2cff73eab102cab1322882508379fa62c3d41cfc506f07a6eb5008be149eed41259bb4c76b35b3083feccc5d89a3a7bae5ce0b9fc5dd567983d80fd80561952f9385163f0f548f20986373ea3834b4404bba711d5f73e819a176165661a5eb8fcbcfd1df87ca67c19", 0xf3}, {&(0x7f0000000600)="7c7cac245bbd724dc22b9d10535df9fabd61ca13d8cb2b962b6725e54df7619758d31d951757e8fc30fbdb85edf00a3a8da980138f0a0db30981bb8d21a591c99e0b53a042ac16312b2c3d62b8a57a5bc924ac86e7e904a135947b2af88a8dedbc3700c358f6c8f85e180250479792463b0c00fad60d25e597ebaf47ad661081dacb25e526fe959f1873fe2ec519fad7a579f8c995e9599562a456683a1386c08f1db0e87c6e73516dd0018f91363115e269357d619c889545039385b218", 0xbe}, {&(0x7f00000006c0)="13526ed982292187de", 0x9}, {&(0x7f0000000700)="a0b2eeb4604cf2b37c74ee1a662e03ac6d2cb96e6fb7e344be3e8d05627661f0ee3f9f82a2fb1343fa2a5c014ec14e5be37fcefebe5cd61fadbe645f08ef71087060c8405fc4f4794ec0733853d61bbaa9adc61b71c2e1873a6a7afa6a01bbbf11cfd4326853d0f9efb222bca875720ba24e0f2cd93b4c438f40b77eec41eb9bb715aa1a15e1df27f47317bfdb75b43898ba", 0x92}], 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="8000000e000012c1468217bf13e169f9a9c4a4000013010000ef0700004e34d603ffe965b0232e7602df1527991d47fd4cfb6b238f8b8a53eac55f4f04cb303049713df5ae3ee237a25a6a4687937b365ef5bf662728c36c37e61b2ed3c2ec78bc4d095a3ee84c2d9a6906cd28179047e5e5322e97bfa3ec3691356f88b03b296a0d88a0e5f1e0c3027f21a8d249376f1ff260d60f2ea5aa1ac73aa7e3d21720842196c9710afeabdc51c2ca8a3a9b03ab54c4b9a3c3705282787b754a35253e93b3bca43effc99944dba731b1c6852868fab460b3408c443801db134bbab84b56fb7da0f2aedf18e68a97e67d444804164ffce24b71a8a45ef14b99e0a56ae002822a6f160469a034720698c2d4c822bd72d8fbb7abdda57ec2920cdbd5dd54f0b8753e45d58aa6a63bea655a2b2a380a44f600d0e7f8da758fd85f2389ca4bca4e283f833e"], 0x80}, 0x0, 0x40001, 0x0, {0x0, r6}}, 0x2) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) syz_io_uring_complete(0x0) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000b71000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r7, r8, &(0x7f00000018c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r9, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0, 0x4c561903a7c10053}, 0x0) r10 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000000300)=0x0, 0x0) r12 = io_uring_register$IORING_REGISTER_PERSONALITY(r10, 0x9, 0x0, 0x0) syz_io_uring_submit(r11, 0x0, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x18, 0x0, 0x0, {0x0, r12}}, 0x0) syz_io_uring_submit(0x0, r8, &(0x7f0000000940)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x1, 0x0, 0x0, 0x0, 0x365cf, 0x0, 0x0, 0x0, {0x0, r12}}, 0x80000000) fork() 11:36:03 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 9) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:36:03 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) 11:36:03 executing program 7: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() (fail_nth: 8) 11:36:03 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x18, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:36:03 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) syz_io_uring_setup(0xdf3, &(0x7f00000003c0)={0x0, 0x14b0, 0x10, 0x3, 0x1e0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f000083b000/0x3000)=nil, &(0x7f0000000440), &(0x7f0000000480)) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() pipe(&(0x7f0000000180)={0xffffffffffffffff}) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f00000012c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_QOS_MAP(r9, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000001300)={0x1c, r10, 0x1, 0x0, 0x0, {{0x75}, {@val={0x8, 0x3, r8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_JOIN_IBSS(r6, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x60, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r8}, @void}}, [@NL80211_ATTR_CONTROL_PORT={0x4}, @NL80211_ATTR_HT_CAPABILITY={0x1e, 0x1f, {0x1c, 0x1, 0x2, 0x0, {0x8, 0x3, 0x0, 0x3f8, 0x0, 0x0, 0x1, 0x1}, 0x8, 0x3ff, 0x7}}, @NL80211_ATTR_BEACON_INTERVAL={0x8, 0xc, @random=0x20}, @NL80211_ATTR_BSS_BASIC_RATES={0x4}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ibss_ssid}, @NL80211_ATTR_FREQ_FIXED={0x4}]}, 0x60}}, 0x20004010) [ 1716.784533] FAULT_INJECTION: forcing a failure. [ 1716.784533] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1716.786034] CPU: 0 PID: 17101 Comm: syz-executor.5 Not tainted 5.10.209 #1 [ 1716.786827] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1716.787625] Call Trace: [ 1716.787889] dump_stack+0x107/0x167 [ 1716.788262] should_fail.cold+0x5/0xa [ 1716.788635] _copy_from_user+0x2e/0x1b0 [ 1716.789019] copy_mount_options+0x76/0x180 [ 1716.789434] __x64_sys_mount+0x1a8/0x300 [ 1716.789832] ? copy_mnt_ns+0xa00/0xa00 [ 1716.790217] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1716.790729] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1716.791233] do_syscall_64+0x33/0x40 [ 1716.791595] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1716.792093] RIP: 0033:0x7f209637204a [ 1716.792460] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1716.794086] RSP: 002b:00007f20938e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1716.794815] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f209637204a [ 1716.795506] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1716.796209] RBP: 00007f20938e6040 R08: 00007f20938e6040 R09: 0000000020000040 [ 1716.796890] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1716.797579] R13: 00000000200000c0 R14: 00007f20938e6000 R15: 00000000200002c0 [ 1716.806788] FAULT_INJECTION: forcing a failure. [ 1716.806788] name failslab, interval 1, probability 0, space 0, times 0 [ 1716.809167] CPU: 1 PID: 17097 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1716.810456] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1716.811993] Call Trace: [ 1716.812529] dump_stack+0x107/0x167 [ 1716.813092] should_fail.cold+0x5/0xa [ 1716.813785] ? __delayacct_tsk_init+0x1b/0x80 [ 1716.814703] should_failslab+0x5/0x20 [ 1716.815416] kmem_cache_alloc+0x5b/0x310 [ 1716.816150] ? prepare_creds+0x466/0x5e0 [ 1716.816926] __delayacct_tsk_init+0x1b/0x80 [ 1716.817758] copy_process+0x3319/0x7800 [ 1716.818392] ? __lock_acquire+0xbb1/0x5b00 [ 1716.819228] ? lock_downgrade+0x6d0/0x6d0 [ 1716.820008] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1716.820971] ? __cleanup_sighand+0xb0/0xb0 [ 1716.821757] ? lock_acquire+0x197/0x470 [ 1716.822499] ? find_held_lock+0x2c/0x110 [ 1716.823283] kernel_clone+0xe7/0x980 [ 1716.823948] ? lock_downgrade+0x6d0/0x6d0 [ 1716.824744] ? find_held_lock+0x2c/0x110 [ 1716.825423] ? create_io_thread+0xf0/0xf0 [ 1716.826223] ? ksys_write+0x12d/0x260 [ 1716.826921] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1716.827706] __do_sys_fork+0x8a/0xc0 [ 1716.828402] ? kernel_thread+0xf0/0xf0 [ 1716.829094] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1716.829887] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1716.830714] ? trace_hardirqs_on+0x5b/0x180 [ 1716.831446] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1716.832346] do_syscall_64+0x33/0x40 [ 1716.832914] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1716.833784] RIP: 0033:0x7fe69fe62b19 [ 1716.834441] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1716.837242] RSP: 002b:00007fe69d3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1716.838589] RAX: ffffffffffffffda RBX: 00007fe69ff75f60 RCX: 00007fe69fe62b19 [ 1716.839685] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1716.840759] RBP: 00007fe69d3d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1716.841825] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1716.842881] R13: 00007ffffc31f9df R14: 00007fe69d3d8300 R15: 0000000000022000 [ 1716.865084] FAULT_INJECTION: forcing a failure. [ 1716.865084] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1716.866886] CPU: 1 PID: 17110 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1716.867948] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1716.869214] Call Trace: [ 1716.869620] dump_stack+0x107/0x167 [ 1716.870181] should_fail.cold+0x5/0xa [ 1716.870778] _copy_from_user+0x2e/0x1b0 [ 1716.871399] copy_mount_options+0x76/0x180 [ 1716.872042] __x64_sys_mount+0x1a8/0x300 [ 1716.872668] ? copy_mnt_ns+0xa00/0xa00 [ 1716.873268] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1716.874054] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1716.874834] do_syscall_64+0x33/0x40 [ 1716.875397] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1716.876212] RIP: 0033:0x7f168587204a [ 1716.876782] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1716.879532] RSP: 002b:00007f1682de5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1716.880672] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f168587204a [ 1716.881741] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1716.882817] RBP: 00007f1682de6040 R08: 00007f1682de6040 R09: 0000000020000040 [ 1716.883885] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1716.884960] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 11:36:04 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) 11:36:04 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:36:04 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xee, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:36:04 executing program 7: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() [ 1717.061674] FAULT_INJECTION: forcing a failure. [ 1717.061674] name failslab, interval 1, probability 0, space 0, times 0 11:36:04 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 9) [ 1717.063497] CPU: 1 PID: 17418 Comm: syz-executor.5 Not tainted 5.10.209 #1 [ 1717.064620] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1717.065880] Call Trace: [ 1717.066284] dump_stack+0x107/0x167 [ 1717.066828] should_fail.cold+0x5/0xa [ 1717.067400] ? getname_flags.part.0+0x50/0x4f0 [ 1717.068098] should_failslab+0x5/0x20 [ 1717.068678] kmem_cache_alloc+0x5b/0x310 [ 1717.069313] getname_flags.part.0+0x50/0x4f0 [ 1717.069961] user_path_at_empty+0xa1/0x100 [ 1717.070608] __x64_sys_mount+0x1e9/0x300 [ 1717.071210] ? copy_mnt_ns+0xa00/0xa00 [ 1717.071792] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1717.072562] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1717.073334] do_syscall_64+0x33/0x40 [ 1717.073881] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1717.074644] RIP: 0033:0x7f209637204a [ 1717.075189] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1717.077950] RSP: 002b:00007f20938e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1717.079210] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f209637204a [ 1717.080270] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1717.081331] RBP: 00007f20938e6040 R08: 00007f20938e6040 R09: 0000000020000040 [ 1717.082386] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1717.083438] R13: 00000000200000c0 R14: 00007f20938e6000 R15: 00000000200002c0 11:36:04 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) [ 1717.117761] FAULT_INJECTION: forcing a failure. [ 1717.117761] name failslab, interval 1, probability 0, space 0, times 0 [ 1717.119044] CPU: 0 PID: 17423 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1717.119709] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1717.120532] Call Trace: [ 1717.120799] dump_stack+0x107/0x167 [ 1717.121172] should_fail.cold+0x5/0xa [ 1717.121551] ? create_object.isra.0+0x3a/0xa20 [ 1717.121999] should_failslab+0x5/0x20 [ 1717.122367] kmem_cache_alloc+0x5b/0x310 [ 1717.122713] create_object.isra.0+0x3a/0xa20 [ 1717.123141] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1717.123566] kmem_cache_alloc+0x159/0x310 [ 1717.123978] __delayacct_tsk_init+0x1b/0x80 [ 1717.124353] copy_process+0x3319/0x7800 [ 1717.124741] ? __lock_acquire+0xbb1/0x5b00 [ 1717.125070] ? lock_downgrade+0x6d0/0x6d0 [ 1717.125481] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1717.125893] ? __cleanup_sighand+0xb0/0xb0 [ 1717.126314] ? lock_acquire+0x197/0x470 [ 1717.126652] ? find_held_lock+0x2c/0x110 [ 1717.127059] kernel_clone+0xe7/0x980 [ 1717.127346] ? lock_downgrade+0x6d0/0x6d0 [ 1717.127754] ? find_held_lock+0x2c/0x110 [ 1717.128066] ? create_io_thread+0xf0/0xf0 [ 1717.128494] ? ksys_write+0x12d/0x260 [ 1717.128883] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1717.129266] __do_sys_fork+0x8a/0xc0 [ 1717.129628] ? kernel_thread+0xf0/0xf0 [ 1717.129940] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1717.130444] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1717.130877] ? trace_hardirqs_on+0x5b/0x180 [ 1717.131296] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1717.131734] do_syscall_64+0x33/0x40 [ 1717.132114] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1717.132546] RIP: 0033:0x7fe69fe62b19 [ 1717.132922] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1717.134421] RSP: 002b:00007fe69d3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1717.135166] RAX: ffffffffffffffda RBX: 00007fe69ff75f60 RCX: 00007fe69fe62b19 [ 1717.135864] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1717.136692] RBP: 00007fe69d3d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1717.137388] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1717.138082] R13: 00007ffffc31f9df R14: 00007fe69d3d8300 R15: 0000000000022000 11:36:04 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)={0x60002000}, 0xffffffffffffffff, 0x1, 0x0, 0x1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x80114, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x20000000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) syz_io_uring_setup(0x7178, &(0x7f0000000180)={0x0, 0x9658, 0x8, 0x3, 0x8, 0x0, r0}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00008e4000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r4, r1, &(0x7f0000000280)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x2, 0x2004, @fd=r2, 0x3f, 0x0, 0x0, 0x2, 0x0, {0x1, r5}}, 0x0) r6 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r6, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() syz_io_uring_submit(0x0, 0x0, &(0x7f00000018c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0, 0x4c561903a7c10053}, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) r9 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000380), 0x2, 0x0) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000003c0)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x4, 0x0, r8, 0x0, r9, 0x2, 0x0, 0x0, {0x0, r10}}, 0x8) [ 1717.249624] FAULT_INJECTION: forcing a failure. [ 1717.249624] name failslab, interval 1, probability 0, space 0, times 0 [ 1717.251635] CPU: 1 PID: 17469 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1717.252792] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1717.254299] Call Trace: [ 1717.254708] dump_stack+0x107/0x167 [ 1717.255266] should_fail.cold+0x5/0xa [ 1717.256044] ? getname_flags.part.0+0x50/0x4f0 [ 1717.256831] should_failslab+0x5/0x20 [ 1717.257411] kmem_cache_alloc+0x5b/0x310 [ 1717.258032] getname_flags.part.0+0x50/0x4f0 [ 1717.258699] user_path_at_empty+0xa1/0x100 [ 1717.259339] __x64_sys_mount+0x1e9/0x300 [ 1717.259952] ? copy_mnt_ns+0xa00/0xa00 [ 1717.260547] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1717.261342] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1717.262138] do_syscall_64+0x33/0x40 [ 1717.262686] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1717.263456] RIP: 0033:0x7f168587204a [ 1717.264006] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1717.266779] RSP: 002b:00007f1682de5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1717.267921] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f168587204a [ 1717.269011] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1717.270259] RBP: 00007f1682de6040 R08: 00007f1682de6040 R09: 0000000020000040 [ 1717.271411] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1717.272567] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 11:36:04 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x500, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:36:04 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 11) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:36:04 executing program 4: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x20, 0x0, 0xffffffff}, &(0x7f00000a0000)=nil, &(0x7f0000916000/0xa000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r1, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x4, 0x0, @fd_index=0xa, 0x0, 0x0, 0x0, {0x28}}, 0x4) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000180)='environ\x00') readv(r5, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000240)={'ip6tnl0\x00', &(0x7f00000001c0)={'sit0\x00', 0x0, 0x0, 0x9, 0x2, 0x1, 0x44, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x2d}}, 0x80, 0x7, 0xff, 0xfffffff8}}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) r7 = dup3(0xffffffffffffffff, r2, 0x80000) sendmsg$NL80211_CMD_SET_QOS_MAP(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f00000015c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="01000000000000a26c39dbc316fdda49b48bef0000007500000008000300", @ANYRES32=0x0, @ANYBLOB="77a90b6943d36b045dafc4fff802582e336b81c8867ce848ae7c525e576f2e8f64b6f4b4640c024be83a74c105cd8f45e66e393ff5e4aaa194d4c79b52b8fc2c6ed84d"], 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f0000000380)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000014c0)={&(0x7f00000003c0)={0xf8, 0x0, 0x10, 0x70bd27, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r8}, @void}}, [@mon_options=[@NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @broadcast}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @broadcast}], @NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}, @NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}, @NL80211_ATTR_MESH_ID={0xa}, @mon_options=[@NL80211_ATTR_MNTR_FLAGS={0x20, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}]}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "4a866ff24c481c39a2cf2227f1c6779396ae47537b411bea"}, @NL80211_ATTR_MNTR_FLAGS={0x14, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}]}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @device_b}, @NL80211_ATTR_MNTR_FLAGS={0xc, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}]}, @NL80211_ATTR_MNTR_FLAGS={0x8, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_COOK_FRAMES={0x4}]}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @broadcast}, @NL80211_ATTR_MNTR_FLAGS={0x2c, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_COOK_FRAMES={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_COOK_FRAMES={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}]}]]}, 0xf8}, 0x1, 0x0, 0x0, 0xa004}, 0x10000000) setsockopt$sock_timeval(r7, 0x1, 0x15, &(0x7f0000000180)={0x0, 0x2710}, 0x10) fork() 11:36:04 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 11) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) [ 1717.424714] FAULT_INJECTION: forcing a failure. [ 1717.424714] name failslab, interval 1, probability 0, space 0, times 0 [ 1717.424792] FAULT_INJECTION: forcing a failure. [ 1717.424792] name failslab, interval 1, probability 0, space 0, times 0 [ 1717.426448] CPU: 1 PID: 17738 Comm: syz-executor.5 Not tainted 5.10.209 #1 [ 1717.428322] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1717.429540] Call Trace: [ 1717.429933] dump_stack+0x107/0x167 [ 1717.430475] should_fail.cold+0x5/0xa [ 1717.431038] ? create_object.isra.0+0x3a/0xa20 [ 1717.431713] should_failslab+0x5/0x20 [ 1717.432281] kmem_cache_alloc+0x5b/0x310 [ 1717.432882] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1717.433655] create_object.isra.0+0x3a/0xa20 [ 1717.434326] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1717.435093] kmem_cache_alloc+0x159/0x310 [ 1717.435721] getname_flags.part.0+0x50/0x4f0 [ 1717.436402] user_path_at_empty+0xa1/0x100 [ 1717.437045] __x64_sys_mount+0x1e9/0x300 [ 1717.437647] ? copy_mnt_ns+0xa00/0xa00 [ 1717.438254] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1717.439024] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1717.439789] do_syscall_64+0x33/0x40 [ 1717.440356] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1717.441124] RIP: 0033:0x7f209637204a [ 1717.441676] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1717.444694] RSP: 002b:00007f20938e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1717.445811] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f209637204a [ 1717.446842] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1717.447876] RBP: 00007f20938e6040 R08: 00007f20938e6040 R09: 0000000020000040 [ 1717.448918] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1717.449952] R13: 00000000200000c0 R14: 00007f20938e6000 R15: 00000000200002c0 [ 1717.451017] CPU: 0 PID: 17740 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1717.451713] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1717.452522] Call Trace: [ 1717.452791] dump_stack+0x107/0x167 [ 1717.453155] should_fail.cold+0x5/0xa [ 1717.453538] ? create_object.isra.0+0x3a/0xa20 [ 1717.454002] should_failslab+0x5/0x20 [ 1717.454389] kmem_cache_alloc+0x5b/0x310 [ 1717.454789] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1717.455231] create_object.isra.0+0x3a/0xa20 [ 1717.455666] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1717.456196] kmem_cache_alloc+0x159/0x310 [ 1717.456540] getname_flags.part.0+0x50/0x4f0 [ 1717.456879] user_path_at_empty+0xa1/0x100 [ 1717.457203] __x64_sys_mount+0x1e9/0x300 [ 1717.457507] ? copy_mnt_ns+0xa00/0xa00 [ 1717.457797] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1717.458185] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1717.458584] do_syscall_64+0x33/0x40 [ 1717.458863] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1717.459246] RIP: 0033:0x7f168587204a [ 1717.459521] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1717.460875] RSP: 002b:00007f1682de5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1717.461431] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f168587204a [ 1717.461961] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1717.462505] RBP: 00007f1682de6040 R08: 00007f1682de6040 R09: 0000000020000040 [ 1717.463041] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1717.463551] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 11:36:04 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 10) [ 1717.563668] FAULT_INJECTION: forcing a failure. [ 1717.563668] name failslab, interval 1, probability 0, space 0, times 0 [ 1717.564789] CPU: 0 PID: 17791 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1717.565315] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1717.565940] Call Trace: [ 1717.566145] dump_stack+0x107/0x167 [ 1717.566424] should_fail.cold+0x5/0xa [ 1717.566707] ? dup_fd+0x89/0xcf0 [ 1717.566959] should_failslab+0x5/0x20 [ 1717.567249] kmem_cache_alloc+0x5b/0x310 [ 1717.567641] dup_fd+0x89/0xcf0 [ 1717.567905] ? audit_filter_inodes+0x40/0x40 [ 1717.568253] ? security_task_alloc+0xe6/0x260 [ 1717.568593] copy_process+0x197e/0x7800 [ 1717.568889] ? __lock_acquire+0xbb1/0x5b00 [ 1717.569210] ? __cleanup_sighand+0xb0/0xb0 [ 1717.569526] ? lock_acquire+0x197/0x470 [ 1717.569818] ? find_held_lock+0x2c/0x110 [ 1717.570130] kernel_clone+0xe7/0x980 [ 1717.570407] ? lock_downgrade+0x6d0/0x6d0 [ 1717.570713] ? find_held_lock+0x2c/0x110 [ 1717.571019] ? create_io_thread+0xf0/0xf0 [ 1717.571343] ? ksys_write+0x12d/0x260 [ 1717.571641] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1717.572003] __do_sys_fork+0x8a/0xc0 [ 1717.572295] ? kernel_thread+0xf0/0xf0 [ 1717.572591] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1717.572986] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1717.573361] ? trace_hardirqs_on+0x5b/0x180 [ 1717.573685] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1717.574073] do_syscall_64+0x33/0x40 [ 1717.574357] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1717.574731] RIP: 0033:0x7fe69fe62b19 [ 1717.575004] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1717.576384] RSP: 002b:00007fe69d3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1717.576953] RAX: ffffffffffffffda RBX: 00007fe69ff75f60 RCX: 00007fe69fe62b19 [ 1717.577488] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1717.578019] RBP: 00007fe69d3d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1717.578548] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1717.579076] R13: 00007ffffc31f9df R14: 00007fe69d3d8300 R15: 0000000000022000 11:36:04 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 12) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) [ 1717.601662] FAULT_INJECTION: forcing a failure. [ 1717.601662] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1717.602630] CPU: 0 PID: 17836 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1717.603153] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1717.603836] Call Trace: [ 1717.604110] dump_stack+0x107/0x167 [ 1717.604407] should_fail.cold+0x5/0xa [ 1717.604701] strncpy_from_user+0x34/0x470 [ 1717.605030] getname_flags.part.0+0x95/0x4f0 [ 1717.605364] user_path_at_empty+0xa1/0x100 [ 1717.605700] __x64_sys_mount+0x1e9/0x300 [ 1717.606010] ? copy_mnt_ns+0xa00/0xa00 [ 1717.606309] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1717.606723] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1717.607128] do_syscall_64+0x33/0x40 [ 1717.607419] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1717.607828] RIP: 0033:0x7f168587204a [ 1717.608124] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1717.609540] RSP: 002b:00007f1682de5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1717.610119] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f168587204a [ 1717.610671] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1717.611212] RBP: 00007f1682de6040 R08: 00007f1682de6040 R09: 0000000020000040 [ 1717.611742] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1717.612286] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 [ 1717.622596] FAULT_INJECTION: forcing a failure. [ 1717.622596] name fail_usercopy, interval 1, probability 0, space 0, times 0 11:36:04 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 12) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) [ 1717.624289] CPU: 0 PID: 17849 Comm: syz-executor.5 Not tainted 5.10.209 #1 [ 1717.624809] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1717.625508] Call Trace: [ 1717.625720] dump_stack+0x107/0x167 [ 1717.625993] should_fail.cold+0x5/0xa [ 1717.626277] strncpy_from_user+0x34/0x470 [ 1717.626605] getname_flags.part.0+0x95/0x4f0 [ 1717.626938] user_path_at_empty+0xa1/0x100 [ 1717.627271] __x64_sys_mount+0x1e9/0x300 [ 1717.627592] ? copy_mnt_ns+0xa00/0xa00 [ 1717.627892] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1717.628293] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1717.628697] do_syscall_64+0x33/0x40 [ 1717.628991] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1717.629368] RIP: 0033:0x7f209637204a [ 1717.629645] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1717.631002] RSP: 002b:00007f20938e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1717.631567] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f209637204a [ 1717.632101] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1717.632631] RBP: 00007f20938e6040 R08: 00007f20938e6040 R09: 0000000020000040 [ 1717.633161] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1717.633687] R13: 00000000200000c0 R14: 00007f20938e6000 R15: 00000000200002c0 11:36:04 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r0, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) syz_io_uring_setup(0x301d, &(0x7f0000000140)={0x0, 0xfcaa, 0x3d1e2c00ad1ddb24, 0x3, 0x369}, &(0x7f0000a32000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000200)) r2 = mmap$IORING_OFF_SQES(&(0x7f00005fd000/0x3000)=nil, 0x3000, 0xf, 0x102030, 0xffffffffffffffff, 0x10000000) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r3, &(0x7f00000004c0)=[{0x0}, {&(0x7f0000000140)=""/102, 0x66}, {&(0x7f00000001c0)=""/215, 0xd7}], 0x3, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000005800)={0x0, 0x0}) recvmmsg$unix(r0, &(0x7f0000005600)=[{{&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/85, 0x55}, {&(0x7f0000000340)=""/126, 0x7e}, {&(0x7f00000003c0)=""/203, 0xcb}, {&(0x7f00000004c0)=""/34, 0x22}, {&(0x7f0000000500)=""/6, 0x6}], 0x5, &(0x7f00000005c0)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000a00)=[{&(0x7f0000000680)=""/58, 0x3a}, {&(0x7f00000006c0)=""/169, 0xa9}, {&(0x7f0000000780)=""/80, 0x50}, {&(0x7f0000000800)=""/230, 0xe6}, {&(0x7f0000000900)=""/188, 0xbc}, {&(0x7f00000009c0)=""/63, 0x3f}], 0x6, &(0x7f0000000a80)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x118}}, {{&(0x7f0000000bc0)=@abs, 0x6e, &(0x7f0000001240)=[{&(0x7f0000000c40)=""/104, 0x68}, {&(0x7f0000000cc0)=""/64, 0x40}, {&(0x7f0000000d00)=""/95, 0x5f}, {&(0x7f0000000d80)=""/171, 0xab}, {&(0x7f0000000e40)=""/34, 0x22}, {&(0x7f0000000e80)=""/204, 0xcc}, {&(0x7f0000000f80)=""/207, 0xcf}, {&(0x7f0000001080)=""/204, 0xcc}, {&(0x7f0000001180)=""/137, 0x89}], 0x9, &(0x7f0000001300)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f00000013c0)=""/154, 0x9a}, {&(0x7f0000001480)=""/228, 0xe4}, {&(0x7f0000001580)=""/216, 0xd8}], 0x3, &(0x7f00000016c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}}, {{&(0x7f0000001700), 0x6e, &(0x7f0000001940)=[{&(0x7f0000001780)=""/181, 0xb5}, {&(0x7f0000001840)=""/197, 0xc5}], 0x2}}, {{&(0x7f0000001980), 0x6e, &(0x7f0000001e00)=[{&(0x7f0000001a00)=""/94, 0x5e}, {&(0x7f0000001a80)=""/180, 0xb4}, {&(0x7f0000001b40)=""/222, 0xde}, {&(0x7f0000001c40)=""/127, 0x7f}, {&(0x7f0000001cc0)=""/45, 0x2d}, {&(0x7f0000001d00)=""/67, 0x43}], 0x6, &(0x7f0000001e80)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}}, {{&(0x7f0000001ec0)=@abs, 0x6e, &(0x7f0000005080)=[{&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000002f40)=""/4096, 0x1000}, {&(0x7f0000003f40)=""/4096, 0x1000}, {&(0x7f0000004f40)=""/143, 0x8f}, {&(0x7f0000005000)=""/124, 0x7c}], 0x5, &(0x7f0000005100)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000005140), 0x6e, &(0x7f0000005540)=[{&(0x7f00000051c0)=""/122, 0x7a}, {&(0x7f0000005240)=""/198, 0xc6}, {&(0x7f0000005340)=""/240, 0xf0}, {&(0x7f0000005440)=""/196, 0xc4}], 0x4, &(0x7f0000005580)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}}], 0x8, 0x100, &(0x7f0000005840)={r4, r5+60000000}) r11 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000000300)=0x0, 0x0) r13 = io_uring_register$IORING_REGISTER_PERSONALITY(r11, 0x9, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f00004c3000/0x1000)=nil, 0x1000, 0x1, 0x810, r10, 0x0) syz_io_uring_submit(r12, 0x0, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x18, 0x0, 0x0, {0x0, r13}}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000005880)=@IORING_OP_READ_FIXED={0x4, 0x2, 0x0, @fd=r7, 0x7f, 0x1, 0x8, 0x8, 0x0, {0x2, r13}}, 0x2) r14 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r15 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r15, 0x0) sendmsg$nl_generic(r9, &(0x7f0000006bc0)={&(0x7f00000058c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000006b80)={&(0x7f0000005940)={0x1238, 0x3a, 0x200, 0x70bd27, 0x25dfdbfc, {0x1c}, [@nested={0x1140, 0x53, 0x0, 0x1, [@generic="d5b8c1fffa6ff5e82867a6c821834669d30921bd3fae5b7a29b2f3422233c836d4ab9d267400efbdd60ce5045677c2ef302d70197a93eae8ef63f376c0555ad1725429746906d277852bd324165b14a1334b39ef36f5c30a888bad97951dff7ed9edca458cdd5da6e055eda2f22d656875abcef04545b9587f0cc97e9893969444ab1b72a8b0cb7df6abc06aff52718118569acfbfa04475f90001ac63f6b5701344b76e4390e303c3177e51ff04abc99f3a178435f08a3f20ac1365276ecc8e76fbfe166d27fbe4c0556213d21680cf13d37c19d29c8a6b665beb5de759d26aa63b3dd99dfbc17c", @generic="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", @typed={0x4, 0x1a}, @typed={0xc, 0x5e, 0x0, 0x0, @u64=0xb0}, @generic="c890d6b9b4fa6f7eb70c8b69aa7cd77dd5395680ce9eddb9c8490700321a4d6570852abb84b085e7acf47b0a22b2355358b31334bc3a205ef35a31e8", @typed={0x8, 0x20, 0x0, 0x0, @pid=r6}]}, @nested={0x89, 0xc, 0x0, 0x1, [@typed={0x8, 0x5e, 0x0, 0x0, @pid}, @generic="ebff7c9975e7772112c8e869956bd835565189de566c56d9b033eb0552a02432de3c7427239e08a7476f9e78316d4922180d521842918f8698fb134fa973fc8c7d7270dcb6df3a0baa829a904e2b103744e438b4a3c920ed4e97c2cceabd7e3fccb8255b2e30d23e009cf9146cb7bf8f0729124e83ccad148d13f7332e"]}, @generic="8cdce1611457a138a5869b00361924476f56a59996c84a656a229fdb127e8debc4631026fcdffcbbb2e8d258afd52fd4e2ece148a8697723c2f90710cc6b465ed175c5bdffc24ab41bead1234fb06d54", @typed={0x8, 0x78, 0x0, 0x0, @pid=r8}]}, 0x1238}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000840) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r14, 0x2405, 0xffffffffffffffff) fork() 11:36:04 executing program 4: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)={0x60002000}, 0xffffffffffffffff, 0x1, 0x0, 0x1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x80114, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x20000000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) syz_io_uring_setup(0x7178, &(0x7f0000000180)={0x0, 0x9658, 0x8, 0x3, 0x8, 0x0, r0}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00008e4000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r4, r1, &(0x7f0000000280)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x2, 0x2004, @fd=r2, 0x3f, 0x0, 0x0, 0x2, 0x0, {0x1, r5}}, 0x0) r6 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r6, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() syz_io_uring_submit(0x0, 0x0, &(0x7f00000018c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0, 0x4c561903a7c10053}, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) r9 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000380), 0x2, 0x0) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000003c0)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x4, 0x0, r8, 0x0, r9, 0x2, 0x0, 0x0, {0x0, r10}}, 0x8) 11:36:17 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 11) 11:36:17 executing program 4: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) r5 = mmap$IORING_OFF_SQES(&(0x7f0000495000/0x1000)=nil, 0x1000, 0x8, 0x50, r0, 0x10000000) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r5, &(0x7f0000000900)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, r2, 0x0, &(0x7f00000008c0)={&(0x7f0000000180)=@nfc_llcp={0x27, 0x0, 0x2, 0x1, 0x7, 0x20, "ce369144fb49ca793f6d592e9eec91c0a33e1244e0217858eac9dfeefbd4c22fa56481fc532c2ad165d3314a02645c03dc8c9b1243af6ae1613216eecc11db", 0x26}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000200)="184cd5f44f6ec47a833df7c7d95285617f14c934b64deb8baa934de02fbf04147acd9f25f5009240f138028361060579a6d58a3991088a404fd05ba7b47542d955510102a5a5264279dc557dd0e0549c744d1a200f333f6e5ce5b89866138cc6f85cead6ecc0d6a73089f89e9820dd0150a6e3b470ef5e7acb10b035840843397bbc7e09207fdcb109166c6d6bf0cd1ec2d2dc9a59b506", 0x97}, {&(0x7f0000000340)="5aad8530ec9afb290f600be6231aa7c3ed3fcf180c42300b327153131afd7612d67bad59c2ef76a0a46d0313465a8b1e9a364f0e9c67881c165fad05d4abd5eb8b09d1dc4d19478b3920c15d218d66e92536a17ba50d5b81d9a680b22266e34404066b", 0x63}, {&(0x7f00000003c0)="805db95511cbf9a1e1f630f70d130b7790870efb7a8a0d83b650576f2d1ac2154622842928feb98afc1a438c2d06e25880127b67aa4c57e9793d3f740aaba35a2e24f062e5230e8dbd61fddeba6f4b54753d8c9438a9f8907e310980046fd0653a6764f3621db421ef87b2b738cd170d616ad12e44d5ef3970ef60c9f1c5053ba2728119fde4b86744fe77c7", 0x8c}, {&(0x7f0000000480)="b5ef78c90fda49686c9957427867b00266411073ca8c567cb481e2484854f20300eb90ab7da9554fcc21b4601774619f4e643e9996d9c3d8739a0f80b364d75a3abf787a9785b45d04f24b91cb2fff36a9cae2c02f0d9570195176d58c86b2c7018eb04877d5e0159edcd308b21e54", 0x6f}, {&(0x7f0000000500)="74fae34699e1c046196afe250dba5a3618eaddc4e0028ae5dc40fb714c8165a52e73a0bc1dc920c89771d0c817e4a10342f74758ce623b864f466d5e93da13a28377d76b87d9f2fcbdeca9566bdeba48fb35cb99a55916cf02c9f91a6e0763a04b32dc03fd237bcd76f8e3d38ad15079049c1b404da85eb53c67e2773de192db0090c62ed616e0717372c2cff73eab102cab1322882508379fa62c3d41cfc506f07a6eb5008be149eed41259bb4c76b35b3083feccc5d89a3a7bae5ce0b9fc5dd567983d80fd80561952f9385163f0f548f20986373ea3834b4404bba711d5f73e819a176165661a5eb8fcbcfd1df87ca67c19", 0xf3}, {&(0x7f0000000600)="7c7cac245bbd724dc22b9d10535df9fabd61ca13d8cb2b962b6725e54df7619758d31d951757e8fc30fbdb85edf00a3a8da980138f0a0db30981bb8d21a591c99e0b53a042ac16312b2c3d62b8a57a5bc924ac86e7e904a135947b2af88a8dedbc3700c358f6c8f85e180250479792463b0c00fad60d25e597ebaf47ad661081dacb25e526fe959f1873fe2ec519fad7a579f8c995e9599562a456683a1386c08f1db0e87c6e73516dd0018f91363115e269357d619c889545039385b218", 0xbe}, {&(0x7f00000006c0)="13526ed982292187de", 0x9}, {&(0x7f0000000700)="a0b2eeb4604cf2b37c74ee1a662e03ac6d2cb96e6fb7e344be3e8d05627661f0ee3f9f82a2fb1343fa2a5c014ec14e5be37fcefebe5cd61fadbe645f08ef71087060c8405fc4f4794ec0733853d61bbaa9adc61b71c2e1873a6a7afa6a01bbbf11cfd4326853d0f9efb222bca875720ba24e0f2cd93b4c438f40b77eec41eb9bb715aa1a15e1df27f47317bfdb75b43898ba", 0x92}], 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="8000000e000012c1468217bf13e169f9a9c4a4000013010000ef0700004e34d603ffe965b0232e7602df1527991d47fd4cfb6b238f8b8a53eac55f4f04cb303049713df5ae3ee237a25a6a4687937b365ef5bf662728c36c37e61b2ed3c2ec78bc4d095a3ee84c2d9a6906cd28179047e5e5322e97bfa3ec3691356f88b03b296a0d88a0e5f1e0c3027f21a8d249376f1ff260d60f2ea5aa1ac73aa7e3d21720842196c9710afeabdc51c2ca8a3a9b03ab54c4b9a3c3705282787b754a35253e93b3bca43effc99944dba731b1c6852868fab460b3408c443801db134bbab84b56fb7da0f2aedf18e68a97e67d444804164ffce24b71a8a45ef14b99e0a56ae002822a6f160469a034720698c2d4c822bd72d8fbb7abdda57ec2920cdbd5dd54f0b8753e45d58aa6a63bea655a2b2a380a44f600d0e7f8da758fd85f2389ca4bca4e283f833e"], 0x80}, 0x0, 0x40001, 0x0, {0x0, r6}}, 0x2) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) syz_io_uring_complete(0x0) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000b71000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r7, r8, &(0x7f00000018c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r9, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0, 0x4c561903a7c10053}, 0x0) r10 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000000300)=0x0, 0x0) r12 = io_uring_register$IORING_REGISTER_PERSONALITY(r10, 0x9, 0x0, 0x0) syz_io_uring_submit(r11, 0x0, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x18, 0x0, 0x0, {0x0, r12}}, 0x0) syz_io_uring_submit(0x0, r8, &(0x7f0000000940)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x1, 0x0, 0x0, 0x0, 0x365cf, 0x0, 0x0, 0x0, {0x0, r12}}, 0x80000000) fork() 11:36:17 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@tipc=@nameseq={0x1e, 0x1, 0x1, {0x1, 0x2, 0x2}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0xfc, 0x0, 0x0, 0xfd, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x14440, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f00007be000/0x1000)=nil, 0x1000, 0xe, 0x40010, r0, 0x0) r5 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000000300)=0x0, 0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(r6, 0x0, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x18, 0x0, 0x0, {0x0, r7}}, 0x0) syz_io_uring_submit(r4, r1, &(0x7f0000000200)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x2e2816ac, 0x0, 0x0, 0x0, 0x0, 0x1, {0x3, r7}}, 0x21) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) r10 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r10, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) syz_io_uring_submit(r8, r9, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x1, 0x2007, @fd=r10, 0x3ff, 0x0, 0x0, 0x10, 0x0, {0x2}}, 0x0) fork() 11:36:17 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='environ\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, &(0x7f000018e000/0x4000)=nil, &(0x7f00008ff000/0x4000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x10, r5, 0x0) syz_io_uring_complete(r6) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r6, 0x0, &(0x7f0000000180)=@IORING_OP_MADVISE={0x19, 0x3, 0x0, 0x0, 0x0, &(0x7f000016a000/0x4000)=nil, 0x4000, 0x0, 0x1, {0x0, r7}}, 0x4) fork() 11:36:18 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x900, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:36:18 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 13) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:36:18 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f000038b000/0x1000)=nil, 0x1000, 0x0, 0x10010, r0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000545000/0x13000)=nil, 0x13000, 0x3000000, 0x30, r0, 0x10000000) syz_io_uring_setup(0x708a, &(0x7f0000000180)={0x0, 0x56c9, 0x2, 0x3, 0x29b, 0x0, r0}, &(0x7f0000807000/0x2000)=nil, &(0x7f0000864000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000240)=0x0) r4 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000000300)=0x0, 0x0) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, 0x0, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080), &(0x7f0000000480)='./file0\x00', 0x18, 0x0, 0x0, {0x0, r6}}, 0x2) syz_io_uring_submit(r2, r3, &(0x7f0000000440)=@IORING_OP_STATX={0x15, 0x3, 0x0, 0xffffffffffffff9c, &(0x7f0000000340), &(0x7f0000000280)='./file0\x00', 0x800, 0x800, 0x0, {0x0, r6}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r7 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r8 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r8, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, 0xffffffffffffffff) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r9, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:36:18 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 13) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) [ 1730.977762] FAULT_INJECTION: forcing a failure. [ 1730.977762] name failslab, interval 1, probability 0, space 0, times 0 [ 1730.979062] CPU: 1 PID: 17968 Comm: syz-executor.5 Not tainted 5.10.209 #1 [ 1730.979681] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1730.980428] Call Trace: [ 1730.980671] dump_stack+0x107/0x167 [ 1730.981003] should_fail.cold+0x5/0xa [ 1730.981351] ? alloc_fs_context+0x57/0x840 [ 1730.981728] should_failslab+0x5/0x20 [ 1730.982072] kmem_cache_alloc_trace+0x55/0x320 [ 1730.982475] ? cap_capable+0x1cd/0x230 [ 1730.982830] alloc_fs_context+0x57/0x840 [ 1730.983202] path_mount+0x962/0x2120 [ 1730.983534] ? strncpy_from_user+0x9e/0x470 [ 1730.983923] ? finish_automount+0xa90/0xa90 [ 1730.984313] ? getname_flags.part.0+0x1dd/0x4f0 [ 1730.984731] __x64_sys_mount+0x282/0x300 [ 1730.985097] ? copy_mnt_ns+0xa00/0xa00 [ 1730.985447] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1730.985914] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1730.986372] do_syscall_64+0x33/0x40 [ 1730.986701] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1730.987155] RIP: 0033:0x7f209637204a [ 1730.987487] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1730.989149] RSP: 002b:00007f20938e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1730.989820] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f209637204a [ 1730.990450] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1730.991080] RBP: 00007f20938e6040 R08: 00007f20938e6040 R09: 0000000020000040 [ 1730.991706] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1730.992348] R13: 00000000200000c0 R14: 00007f20938e6000 R15: 00000000200002c0 [ 1730.998252] FAULT_INJECTION: forcing a failure. [ 1730.998252] name failslab, interval 1, probability 0, space 0, times 0 [ 1730.999355] CPU: 1 PID: 17977 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1730.999962] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1731.000699] Call Trace: [ 1731.000941] dump_stack+0x107/0x167 [ 1731.001269] should_fail.cold+0x5/0xa [ 1731.001611] ? create_object.isra.0+0x3a/0xa20 [ 1731.002020] should_failslab+0x5/0x20 [ 1731.002357] kmem_cache_alloc+0x5b/0x310 [ 1731.002722] create_object.isra.0+0x3a/0xa20 [ 1731.003115] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1731.003566] kmem_cache_alloc+0x159/0x310 [ 1731.003941] dup_fd+0x89/0xcf0 [ 1731.004224] ? audit_filter_inodes+0x40/0x40 [ 1731.004622] ? security_task_alloc+0xe6/0x260 [ 1731.005021] copy_process+0x197e/0x7800 [ 1731.005374] ? __lock_acquire+0xbb1/0x5b00 [ 1731.005765] ? __cleanup_sighand+0xb0/0xb0 [ 1731.006142] ? lock_acquire+0x197/0x470 [ 1731.006498] ? find_held_lock+0x2c/0x110 [ 1731.006860] kernel_clone+0xe7/0x980 [ 1731.007187] ? lock_downgrade+0x6d0/0x6d0 [ 1731.007553] ? find_held_lock+0x2c/0x110 [ 1731.007911] ? create_io_thread+0xf0/0xf0 [ 1731.008280] ? ksys_write+0x12d/0x260 [ 1731.008624] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1731.009054] __do_sys_fork+0x8a/0xc0 [ 1731.009380] ? kernel_thread+0xf0/0xf0 [ 1731.009735] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1731.010196] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1731.010651] ? trace_hardirqs_on+0x5b/0x180 [ 1731.011032] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1731.011488] do_syscall_64+0x33/0x40 [ 1731.011816] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1731.012269] RIP: 0033:0x7fe69fe62b19 [ 1731.012612] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1731.014197] RSP: 002b:00007fe69d3b7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1731.014865] RAX: ffffffffffffffda RBX: 00007fe69ff76020 RCX: 00007fe69fe62b19 [ 1731.015488] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1731.016116] RBP: 00007fe69d3b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 1731.016742] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1731.017363] R13: 00007ffffc31f9df R14: 00007fe69d3b7300 R15: 0000000000022000 [ 1731.025594] FAULT_INJECTION: forcing a failure. [ 1731.025594] name failslab, interval 1, probability 0, space 0, times 0 [ 1731.026741] CPU: 1 PID: 17971 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1731.027336] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1731.028055] Call Trace: [ 1731.028289] dump_stack+0x107/0x167 [ 1731.028617] should_fail.cold+0x5/0xa [ 1731.028951] ? alloc_fs_context+0x57/0x840 [ 1731.029320] should_failslab+0x5/0x20 [ 1731.029652] kmem_cache_alloc_trace+0x55/0x320 [ 1731.030047] ? cap_capable+0x1cd/0x230 [ 1731.030391] alloc_fs_context+0x57/0x840 [ 1731.030748] path_mount+0x962/0x2120 [ 1731.031079] ? strncpy_from_user+0x9e/0x470 [ 1731.031452] ? finish_automount+0xa90/0xa90 [ 1731.031829] ? getname_flags.part.0+0x1dd/0x4f0 [ 1731.032238] __x64_sys_mount+0x282/0x300 [ 1731.032600] ? copy_mnt_ns+0xa00/0xa00 [ 1731.032946] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1731.033398] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1731.033846] do_syscall_64+0x33/0x40 [ 1731.034173] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1731.034613] RIP: 0033:0x7f168587204a [ 1731.034939] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1731.036523] RSP: 002b:00007f1682de5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1731.037179] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f168587204a [ 1731.037794] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1731.038406] RBP: 00007f1682de6040 R08: 00007f1682de6040 R09: 0000000020000040 [ 1731.039025] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1731.039641] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 11:36:18 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 14) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:36:18 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 1) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:36:18 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 14) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) [ 1731.260348] FAULT_INJECTION: forcing a failure. [ 1731.260348] name failslab, interval 1, probability 0, space 0, times 0 [ 1731.261525] CPU: 1 PID: 18209 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1731.262083] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1731.262746] Call Trace: [ 1731.262966] dump_stack+0x107/0x167 [ 1731.263263] should_fail.cold+0x5/0xa [ 1731.263568] ? getname_flags.part.0+0x50/0x4f0 [ 1731.263936] should_failslab+0x5/0x20 [ 1731.264252] kmem_cache_alloc+0x5b/0x310 [ 1731.264588] getname_flags.part.0+0x50/0x4f0 [ 1731.264946] getname_flags+0x9a/0xe0 [ 1731.265247] do_mkdirat+0x8f/0x2b0 [ 1731.265535] ? user_path_create+0xf0/0xf0 [ 1731.265870] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1731.266293] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1731.266715] do_syscall_64+0x33/0x40 [ 1731.267012] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1731.267419] RIP: 0033:0x7fa51a612c27 [ 1731.267723] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1731.269185] RSP: 002b:00007fa517b88fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1731.269802] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa51a612c27 [ 1731.270385] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 1731.270958] RBP: 00007fa517b89040 R08: 0000000000000000 R09: 0000000000020020 [ 1731.271536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000040 [ 1731.272104] R13: 00000000200000c0 R14: 00007fa517b89000 R15: 00000000200002c0 11:36:18 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 12) [ 1731.323741] FAULT_INJECTION: forcing a failure. [ 1731.323741] name failslab, interval 1, probability 0, space 0, times 0 [ 1731.326671] CPU: 0 PID: 18206 Comm: syz-executor.5 Not tainted 5.10.209 #1 [ 1731.328091] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1731.329810] Call Trace: [ 1731.330365] dump_stack+0x107/0x167 [ 1731.331127] should_fail.cold+0x5/0xa [ 1731.331927] ? create_object.isra.0+0x3a/0xa20 [ 1731.332890] should_failslab+0x5/0x20 [ 1731.333683] kmem_cache_alloc+0x5b/0x310 [ 1731.334501] create_object.isra.0+0x3a/0xa20 [ 1731.335374] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1731.336385] kmem_cache_alloc_trace+0x151/0x320 [ 1731.337296] ? cap_capable+0x1cd/0x230 [ 1731.338069] alloc_fs_context+0x57/0x840 [ 1731.338873] path_mount+0x962/0x2120 [ 1731.339612] ? strncpy_from_user+0x9e/0x470 [ 1731.340459] ? finish_automount+0xa90/0xa90 [ 1731.341288] ? getname_flags.part.0+0x1dd/0x4f0 [ 1731.342210] __x64_sys_mount+0x282/0x300 [ 1731.343003] ? copy_mnt_ns+0xa00/0xa00 [ 1731.343894] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1731.344906] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1731.345893] do_syscall_64+0x33/0x40 [ 1731.346611] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1731.347588] RIP: 0033:0x7f209637204a [ 1731.348296] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1731.351849] RSP: 002b:00007f20938e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1731.353329] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f209637204a [ 1731.354707] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1731.356062] RBP: 00007f20938e6040 R08: 00007f20938e6040 R09: 0000000020000040 [ 1731.357429] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1731.358787] R13: 00000000200000c0 R14: 00007f20938e6000 R15: 00000000200002c0 [ 1731.364309] FAULT_INJECTION: forcing a failure. [ 1731.364309] name failslab, interval 1, probability 0, space 0, times 0 [ 1731.365289] CPU: 1 PID: 18266 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1731.365886] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1731.366595] Call Trace: [ 1731.366829] dump_stack+0x107/0x167 [ 1731.367157] should_fail.cold+0x5/0xa [ 1731.367489] ? alloc_fdtable+0x84/0x280 [ 1731.367826] should_failslab+0x5/0x20 [ 1731.368169] kmem_cache_alloc_trace+0x55/0x320 [ 1731.368571] ? rwlock_bug.part.0+0x90/0x90 [ 1731.368936] alloc_fdtable+0x84/0x280 [ 1731.369277] dup_fd+0x74d/0xcf0 [ 1731.369570] ? security_task_alloc+0xe6/0x260 [ 1731.369971] copy_process+0x197e/0x7800 [ 1731.370342] ? __lock_acquire+0xbb1/0x5b00 [ 1731.370725] ? __cleanup_sighand+0xb0/0xb0 [ 1731.371093] ? lock_acquire+0x197/0x470 [ 1731.371436] ? find_held_lock+0x2c/0x110 [ 1731.371780] kernel_clone+0xe7/0x980 [ 1731.372103] ? lock_downgrade+0x6d0/0x6d0 [ 1731.372469] ? find_held_lock+0x2c/0x110 [ 1731.372828] ? create_io_thread+0xf0/0xf0 [ 1731.373185] ? ksys_write+0x12d/0x260 [ 1731.373525] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1731.373948] __do_sys_fork+0x8a/0xc0 [ 1731.374269] ? kernel_thread+0xf0/0xf0 [ 1731.374625] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1731.375079] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1731.375529] ? trace_hardirqs_on+0x5b/0x180 [ 1731.375902] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1731.376349] do_syscall_64+0x33/0x40 [ 1731.376667] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1731.377099] RIP: 0033:0x7fe69fe62b19 [ 1731.377418] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1731.379089] RSP: 002b:00007fe69d3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1731.379994] RAX: ffffffffffffffda RBX: 00007fe69ff75f60 RCX: 00007fe69fe62b19 [ 1731.380613] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1731.381224] RBP: 00007fe69d3d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1731.381829] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1731.382441] R13: 00007ffffc31f9df R14: 00007fe69d3d8300 R15: 0000000000022000 11:36:18 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 2) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) [ 1731.415051] FAULT_INJECTION: forcing a failure. [ 1731.415051] name failslab, interval 1, probability 0, space 0, times 0 [ 1731.416221] CPU: 0 PID: 18284 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1731.416803] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1731.417234] FAULT_INJECTION: forcing a failure. [ 1731.417234] name failslab, interval 1, probability 0, space 0, times 0 [ 1731.417478] Call Trace: [ 1731.417497] dump_stack+0x107/0x167 [ 1731.417515] should_fail.cold+0x5/0xa [ 1731.419222] ? create_object.isra.0+0x3a/0xa20 [ 1731.419595] should_failslab+0x5/0x20 [ 1731.419907] kmem_cache_alloc+0x5b/0x310 [ 1731.420241] create_object.isra.0+0x3a/0xa20 [ 1731.420610] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1731.421022] kmem_cache_alloc_trace+0x151/0x320 [ 1731.421399] ? cap_capable+0x1cd/0x230 [ 1731.421724] alloc_fs_context+0x57/0x840 [ 1731.422067] path_mount+0x962/0x2120 [ 1731.422372] ? strncpy_from_user+0x9e/0x470 [ 1731.422720] ? finish_automount+0xa90/0xa90 [ 1731.423077] ? getname_flags.part.0+0x1dd/0x4f0 [ 1731.423457] __x64_sys_mount+0x282/0x300 [ 1731.423788] ? copy_mnt_ns+0xa00/0xa00 [ 1731.424113] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1731.424545] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1731.424964] do_syscall_64+0x33/0x40 [ 1731.425271] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1731.425683] RIP: 0033:0x7f168587204a [ 1731.425990] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1731.427463] RSP: 002b:00007f1682de5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1731.428075] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f168587204a [ 1731.428652] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1731.429231] RBP: 00007f1682de6040 R08: 00007f1682de6040 R09: 0000000020000040 [ 1731.429803] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1731.430378] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 [ 1731.430973] CPU: 1 PID: 18294 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1731.431583] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1731.432425] Call Trace: [ 1731.432734] dump_stack+0x107/0x167 [ 1731.433128] should_fail.cold+0x5/0xa [ 1731.433509] ? create_object.isra.0+0x3a/0xa20 [ 1731.433977] should_failslab+0x5/0x20 [ 1731.434289] kmem_cache_alloc+0x5b/0x310 [ 1731.434614] ? ksys_write+0x21a/0x260 [ 1731.434926] create_object.isra.0+0x3a/0xa20 [ 1731.435279] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1731.435686] kmem_cache_alloc+0x159/0x310 [ 1731.436020] getname_flags.part.0+0x50/0x4f0 [ 1731.436382] getname_flags+0x9a/0xe0 [ 1731.436789] do_mkdirat+0x8f/0x2b0 [ 1731.437134] ? user_path_create+0xf0/0xf0 [ 1731.437583] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1731.438009] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1731.438440] do_syscall_64+0x33/0x40 [ 1731.438843] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1731.439415] RIP: 0033:0x7fa51a612c27 [ 1731.439826] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1731.441714] RSP: 002b:00007fa517b88fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1731.442544] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa51a612c27 [ 1731.443311] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 1731.443983] RBP: 00007fa517b89040 R08: 0000000000000000 R09: 0000000000020020 [ 1731.444560] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000040 [ 1731.445130] R13: 00000000200000c0 R14: 00007fa517b89000 R15: 00000000200002c0 11:36:31 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 3) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:36:31 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000180), 0x8) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:36:31 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 15) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:36:31 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x1800, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:36:31 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 13) 11:36:31 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 15) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:36:31 executing program 7: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x5a, 0x400001) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000400)={'gretap0\x00', 0x0, 0x1, 0x7800, 0x7f, 0x0, {{0x9, 0x4, 0x0, 0x4, 0x24, 0x66, 0x0, 0xff, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0xd}, @rand_addr=0x64010101, {[@rr={0x7, 0xf, 0x6a, [@multicast2, @multicast1, @multicast1]}]}}}}}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000140)={@private0, @loopback, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400032, r5}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f00000006c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000500)={0x14c, r1, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x10090}, 0x4) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x8}, &(0x7f00000a0000)=nil, &(0x7f000093e000/0x2000)=nil, 0x0, &(0x7f0000000140)=0x0) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r6, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r7, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r8, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) r11 = creat(&(0x7f0000000700)='./file0\x00', 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r11, 0x942e, 0x0) syz_io_uring_submit(r9, r10, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:36:31 executing program 3: r0 = syz_io_uring_setup(0x4d4c, &(0x7f00000002c0)={0x0, 0x0, 0x8, 0x0, 0x352}, &(0x7f00000a0000)=nil, &(0x7f0000a35000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x7, 0x88, 0x3, 0x2, 0x0, 0xc8e, 0x20, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xe4d, 0x1, @perf_bp={&(0x7f0000000180)}, 0x40, 0x9, 0x4, 0x5, 0x4c347722, 0x3ff, 0x4, 0x0, 0x8, 0x0, 0x6f26cece}, 0xffffffffffffffff, 0xa, r3, 0x8) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) ioctl$FS_IOC_MEASURE_VERITY(r5, 0xc0046686, &(0x7f0000000340)={0x1, 0x5, "58dfb4cc7f"}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ae8000/0x6000)=nil, 0x6000, 0x0, 0x1010, r0, 0x0) r7 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000000300)=0x0, 0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) syz_io_uring_submit(r8, 0x0, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x18, 0x0, 0x0, {0x0, r9}}, 0x0) syz_io_uring_submit(r6, r1, &(0x7f0000000280)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, r2, 0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x208800, 0x23456, {0x0, r9}}, 0x6e) fork() [ 1744.458056] FAULT_INJECTION: forcing a failure. [ 1744.458056] name failslab, interval 1, probability 0, space 0, times 0 [ 1744.459129] CPU: 0 PID: 18404 Comm: syz-executor.5 Not tainted 5.10.209 #1 [ 1744.459744] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1744.460505] Call Trace: [ 1744.460769] dump_stack+0x107/0x167 [ 1744.461125] should_fail.cold+0x5/0xa [ 1744.461496] ? memcg_alloc_page_obj_cgroups+0x73/0x100 [ 1744.461971] should_failslab+0x5/0x20 [ 1744.462318] __kmalloc_node+0x76/0x420 [ 1744.462670] ? lock_downgrade+0x6d0/0x6d0 [ 1744.463049] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 1744.463514] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 1744.463967] ? trace_hardirqs_on+0x5b/0x180 [ 1744.464359] kmem_cache_alloc_trace+0x169/0x320 [ 1744.464791] ? cap_capable+0x1cd/0x230 [ 1744.465154] alloc_fs_context+0x57/0x840 [ 1744.465528] path_mount+0x962/0x2120 [ 1744.465872] ? strncpy_from_user+0x9e/0x470 [ 1744.466286] ? finish_automount+0xa90/0xa90 [ 1744.466680] ? getname_flags.part.0+0x1dd/0x4f0 [ 1744.467112] __x64_sys_mount+0x282/0x300 [ 1744.467483] ? copy_mnt_ns+0xa00/0xa00 [ 1744.467838] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1744.468304] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1744.468776] do_syscall_64+0x33/0x40 [ 1744.469114] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1744.469573] RIP: 0033:0x7f209637204a [ 1744.469907] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1744.471538] RSP: 002b:00007f20938e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1744.472223] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f209637204a [ 1744.472874] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1744.473521] RBP: 00007f20938e6040 R08: 00007f20938e6040 R09: 0000000020000040 [ 1744.474151] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1744.474778] R13: 00000000200000c0 R14: 00007f20938e6000 R15: 00000000200002c0 [ 1744.486256] FAULT_INJECTION: forcing a failure. [ 1744.486256] name failslab, interval 1, probability 0, space 0, times 0 [ 1744.487405] CPU: 0 PID: 18405 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1744.488029] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1744.488767] Call Trace: [ 1744.489024] dump_stack+0x107/0x167 [ 1744.489376] should_fail.cold+0x5/0xa [ 1744.489729] ? legacy_init_fs_context+0x44/0xe0 [ 1744.490146] should_failslab+0x5/0x20 [ 1744.490494] kmem_cache_alloc_trace+0x55/0x320 [ 1744.490915] ? lockdep_init_map_type+0x2c7/0x780 [ 1744.491332] legacy_init_fs_context+0x44/0xe0 [ 1744.491738] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1744.492181] alloc_fs_context+0x4fd/0x840 [ 1744.492559] path_mount+0x962/0x2120 [ 1744.492892] ? strncpy_from_user+0x9e/0x470 [ 1744.493273] ? finish_automount+0xa90/0xa90 [ 1744.493651] ? getname_flags.part.0+0x1dd/0x4f0 [ 1744.494064] __x64_sys_mount+0x282/0x300 [ 1744.494428] ? copy_mnt_ns+0xa00/0xa00 [ 1744.494782] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1744.495245] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1744.495715] do_syscall_64+0x33/0x40 [ 1744.496051] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1744.496551] RIP: 0033:0x7f168587204a [ 1744.496897] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1744.498522] RSP: 002b:00007f1682de5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1744.499187] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f168587204a [ 1744.500005] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1744.500652] RBP: 00007f1682de6040 R08: 00007f1682de6040 R09: 0000000020000040 [ 1744.501277] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1744.501906] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 [ 1744.513403] FAULT_INJECTION: forcing a failure. [ 1744.513403] name failslab, interval 1, probability 0, space 0, times 0 [ 1744.515869] CPU: 1 PID: 18414 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1744.517049] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1744.518514] Call Trace: [ 1744.519051] dump_stack+0x107/0x167 [ 1744.519728] should_fail.cold+0x5/0xa [ 1744.520476] ? create_object.isra.0+0x3a/0xa20 [ 1744.521292] should_failslab+0x5/0x20 [ 1744.521988] kmem_cache_alloc+0x5b/0x310 [ 1744.522765] create_object.isra.0+0x3a/0xa20 [ 1744.523556] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1744.524496] kmem_cache_alloc_trace+0x151/0x320 [ 1744.525366] ? rwlock_bug.part.0+0x90/0x90 [ 1744.526100] alloc_fdtable+0x84/0x280 [ 1744.526820] dup_fd+0x74d/0xcf0 [ 1744.527411] ? security_task_alloc+0xe6/0x260 [ 1744.528227] copy_process+0x197e/0x7800 [ 1744.528975] ? __lock_acquire+0xbb1/0x5b00 [ 1744.529737] ? __cleanup_sighand+0xb0/0xb0 [ 1744.530509] ? lock_acquire+0x197/0x470 [ 1744.531267] ? find_held_lock+0x2c/0x110 [ 1744.532025] kernel_clone+0xe7/0x980 [ 1744.532664] ? lock_downgrade+0x6d0/0x6d0 [ 1744.533467] ? find_held_lock+0x2c/0x110 [ 1744.534170] ? create_io_thread+0xf0/0xf0 [ 1744.534933] ? ksys_write+0x12d/0x260 [ 1744.535661] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1744.536590] __do_sys_fork+0x8a/0xc0 [ 1744.537270] ? kernel_thread+0xf0/0xf0 [ 1744.538018] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1744.538982] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1744.539828] ? trace_hardirqs_on+0x5b/0x180 [ 1744.540605] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1744.541495] do_syscall_64+0x33/0x40 [ 1744.542079] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1744.542867] RIP: 0033:0x7fe69fe62b19 [ 1744.543442] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1744.546246] RSP: 002b:00007fe69d3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1744.547331] RAX: ffffffffffffffda RBX: 00007fe69ff75f60 RCX: 00007fe69fe62b19 [ 1744.548411] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1744.549494] RBP: 00007fe69d3d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1744.550579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1744.551778] R13: 00007ffffc31f9df R14: 00007fe69d3d8300 R15: 0000000000022000 [ 1744.575083] FAULT_INJECTION: forcing a failure. [ 1744.575083] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1744.576169] CPU: 0 PID: 18401 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1744.576776] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1744.577506] Call Trace: [ 1744.577749] dump_stack+0x107/0x167 [ 1744.578080] should_fail.cold+0x5/0xa [ 1744.578425] strncpy_from_user+0x34/0x470 [ 1744.578794] getname_flags.part.0+0x95/0x4f0 [ 1744.579184] getname_flags+0x9a/0xe0 [ 1744.579506] do_mkdirat+0x8f/0x2b0 [ 1744.579812] ? user_path_create+0xf0/0xf0 [ 1744.580176] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1744.580652] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1744.581120] do_syscall_64+0x33/0x40 [ 1744.581442] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1744.581901] RIP: 0033:0x7fa51a612c27 [ 1744.582231] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1744.583823] RSP: 002b:00007fa517b88fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1744.584628] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa51a612c27 [ 1744.585221] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 1744.585810] RBP: 00007fa517b89040 R08: 0000000000000000 R09: 0000000000020020 [ 1744.586403] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000040 [ 1744.586997] R13: 00000000200000c0 R14: 00007fa517b89000 R15: 00000000200002c0 11:36:31 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 16) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:36:31 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x4000, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:36:31 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 4) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:36:31 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 16) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:36:31 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 14) [ 1744.734551] FAULT_INJECTION: forcing a failure. [ 1744.734551] name failslab, interval 1, probability 0, space 0, times 0 [ 1744.735751] CPU: 0 PID: 18593 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1744.736310] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1744.736978] Call Trace: [ 1744.737198] dump_stack+0x107/0x167 [ 1744.737493] should_fail.cold+0x5/0xa [ 1744.737817] ? legacy_init_fs_context+0x44/0xe0 [ 1744.738198] should_failslab+0x5/0x20 [ 1744.738506] kmem_cache_alloc_trace+0x55/0x320 [ 1744.738876] ? lockdep_init_map_type+0x2c7/0x780 [ 1744.739268] legacy_init_fs_context+0x44/0xe0 [ 1744.739626] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1744.740038] alloc_fs_context+0x4fd/0x840 [ 1744.740371] path_mount+0x962/0x2120 [ 1744.740676] ? strncpy_from_user+0x9e/0x470 [ 1744.741019] ? finish_automount+0xa90/0xa90 [ 1744.741360] ? getname_flags.part.0+0x1dd/0x4f0 [ 1744.741731] __x64_sys_mount+0x282/0x300 [ 1744.742056] ? copy_mnt_ns+0xa00/0xa00 [ 1744.742367] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1744.742783] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1744.743194] do_syscall_64+0x33/0x40 [ 1744.743488] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1744.743901] RIP: 0033:0x7f168587204a [ 1744.744215] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1744.745653] RSP: 002b:00007f1682de5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1744.746253] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f168587204a [ 1744.746809] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1744.747370] RBP: 00007f1682de6040 R08: 00007f1682de6040 R09: 0000000020000040 [ 1744.747926] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1744.748500] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 [ 1744.764285] FAULT_INJECTION: forcing a failure. [ 1744.764285] name failslab, interval 1, probability 0, space 0, times 0 [ 1744.765452] CPU: 0 PID: 18645 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1744.766018] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1744.766692] Call Trace: [ 1744.766908] dump_stack+0x107/0x167 [ 1744.767209] should_fail.cold+0x5/0xa [ 1744.767523] ? kvmalloc_node+0x119/0x170 [ 1744.767851] should_failslab+0x5/0x20 [ 1744.768167] __kmalloc_node+0x76/0x420 [ 1744.768493] kvmalloc_node+0x119/0x170 [ 1744.768810] alloc_fdtable+0xd3/0x280 [ 1744.769125] dup_fd+0x74d/0xcf0 [ 1744.769397] ? security_task_alloc+0xe6/0x260 [ 1744.769759] copy_process+0x197e/0x7800 [ 1744.770078] ? __lock_acquire+0xbb1/0x5b00 [ 1744.770428] ? __cleanup_sighand+0xb0/0xb0 [ 1744.770825] ? lock_acquire+0x197/0x470 [ 1744.771231] ? find_held_lock+0x2c/0x110 [ 1744.771561] kernel_clone+0xe7/0x980 [ 1744.771855] ? lock_downgrade+0x6d0/0x6d0 [ 1744.772187] ? find_held_lock+0x2c/0x110 [ 1744.772514] ? create_io_thread+0xf0/0xf0 [ 1744.772845] ? ksys_write+0x12d/0x260 [ 1744.773147] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1744.773526] __do_sys_fork+0x8a/0xc0 [ 1744.773821] ? kernel_thread+0xf0/0xf0 [ 1744.774144] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1744.774571] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1744.774980] ? trace_hardirqs_on+0x5b/0x180 [ 1744.775325] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1744.775744] do_syscall_64+0x33/0x40 [ 1744.776050] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1744.776463] RIP: 0033:0x7fe69fe62b19 [ 1744.776762] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1744.778235] RSP: 002b:00007fe69d3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1744.778844] RAX: ffffffffffffffda RBX: 00007fe69ff75f60 RCX: 00007fe69fe62b19 [ 1744.779408] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1744.780013] RBP: 00007fe69d3d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1744.780595] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1744.781167] R13: 00007ffffc31f9df R14: 00007fe69d3d8300 R15: 0000000000022000 [ 1744.812203] FAULT_INJECTION: forcing a failure. [ 1744.812203] name failslab, interval 1, probability 0, space 0, times 0 [ 1744.813286] CPU: 0 PID: 18667 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1744.813840] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1744.814506] Call Trace: [ 1744.814725] dump_stack+0x107/0x167 [ 1744.815027] should_fail.cold+0x5/0xa [ 1744.815335] should_failslab+0x5/0x20 [ 1744.815643] __kmalloc_track_caller+0x79/0x370 [ 1744.816017] ? strndup_user+0x74/0xe0 [ 1744.816328] ? getname_flags.part.0+0x1dd/0x4f0 [ 1744.816725] memdup_user+0x22/0xd0 [ 1744.817022] strndup_user+0x74/0xe0 [ 1744.817317] __x64_sys_mount+0x133/0x300 [ 1744.817643] ? copy_mnt_ns+0xa00/0xa00 [ 1744.817962] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1744.818491] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1744.818935] do_syscall_64+0x33/0x40 [ 1744.819236] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1744.819657] RIP: 0033:0x7fa51a61504a [ 1744.819953] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1744.821402] RSP: 002b:00007fa517b88fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1744.821997] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa51a61504a [ 1744.822561] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1744.823141] RBP: 00007fa517b89040 R08: 00007fa517b89040 R09: 0000000020000040 [ 1744.823705] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1744.824258] R13: 00000000200000c0 R14: 00007fa517b89000 R15: 00000000200002c0 11:36:31 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 17) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) [ 1744.870765] FAULT_INJECTION: forcing a failure. [ 1744.870765] name failslab, interval 1, probability 0, space 0, times 0 [ 1744.872231] CPU: 0 PID: 18722 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1744.872921] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1744.873573] Call Trace: [ 1744.873792] dump_stack+0x107/0x167 [ 1744.874089] should_fail.cold+0x5/0xa [ 1744.874405] should_failslab+0x5/0x20 [ 1744.874715] __kmalloc_track_caller+0x79/0x370 [ 1744.875083] ? match_number+0xaf/0x1d0 [ 1744.875411] kmemdup_nul+0x2d/0xa0 [ 1744.875693] match_number+0xaf/0x1d0 [ 1744.875993] ? match_u64+0x190/0x190 [ 1744.876289] ? list_lru_walk_node+0x209/0x2b0 [ 1744.876661] ? lock_downgrade+0x6d0/0x6d0 [ 1744.877000] tracefs_parse_options+0x36b/0x550 [ 1744.877366] ? tracefs_show_options+0x1e0/0x1e0 [ 1744.877740] ? get_nr_dirty_inodes+0x19e/0x220 [ 1744.878119] ? __sync_blockdev+0xbe/0xf0 [ 1744.878448] ? sync_filesystem.part.0+0x191/0x1f0 [ 1744.878836] tracefs_remount+0x48/0x90 [ 1744.879148] ? tracefs_apply_options.isra.0+0x950/0x950 [ 1744.879576] legacy_reconfigure+0x11b/0x190 [ 1744.879936] reconfigure_super+0x414/0x9c0 [ 1744.880277] ? fs_umode_to_dtype+0xb0/0xb0 [ 1744.880625] path_mount+0x1ae0/0x2120 [ 1744.880939] ? strncpy_from_user+0x9e/0x470 [ 1744.881288] ? finish_automount+0xa90/0xa90 [ 1744.881640] ? getname_flags.part.0+0x1dd/0x4f0 [ 1744.882024] __x64_sys_mount+0x282/0x300 [ 1744.882351] ? copy_mnt_ns+0xa00/0xa00 [ 1744.882665] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1744.883087] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1744.883501] do_syscall_64+0x33/0x40 [ 1744.883804] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1744.884226] RIP: 0033:0x7f168587204a [ 1744.884541] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1744.885995] RSP: 002b:00007f1682de5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1744.886595] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f168587204a [ 1744.887160] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1744.887452] FAULT_INJECTION: forcing a failure. [ 1744.887452] name failslab, interval 1, probability 0, space 0, times 0 [ 1744.887731] RBP: 00007f1682de6040 R08: 00007f1682de6040 R09: 0000000020000040 [ 1744.890005] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1744.890569] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 [ 1744.891174] CPU: 1 PID: 18687 Comm: syz-executor.5 Not tainted 5.10.209 #1 [ 1744.892269] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1744.893552] Call Trace: [ 1744.893968] dump_stack+0x107/0x167 [ 1744.894538] should_fail.cold+0x5/0xa [ 1744.895128] ? create_object.isra.0+0x3a/0xa20 [ 1744.895834] should_failslab+0x5/0x20 [ 1744.896409] kmem_cache_alloc+0x5b/0x310 [ 1744.897038] create_object.isra.0+0x3a/0xa20 [ 1744.897713] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1744.898486] kmem_cache_alloc_trace+0x151/0x320 [ 1744.899201] ? lockdep_init_map_type+0x2c7/0x780 [ 1744.899929] legacy_init_fs_context+0x44/0xe0 [ 1744.900623] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1744.901381] alloc_fs_context+0x4fd/0x840 [ 1744.902001] path_mount+0x962/0x2120 [ 1744.902552] ? strncpy_from_user+0x9e/0x470 [ 1744.903184] ? finish_automount+0xa90/0xa90 [ 1744.903807] ? getname_flags.part.0+0x1dd/0x4f0 [ 1744.904492] __x64_sys_mount+0x282/0x300 [ 1744.905081] ? copy_mnt_ns+0xa00/0xa00 [ 1744.905652] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1744.906413] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1744.907162] do_syscall_64+0x33/0x40 [ 1744.907707] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1744.908456] RIP: 0033:0x7f209637204a [ 1744.908999] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1744.911642] RSP: 002b:00007f20938e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1744.912711] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f209637204a [ 1744.913745] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1744.914773] RBP: 00007f20938e6040 R08: 00007f20938e6040 R09: 0000000020000040 [ 1744.915812] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1744.916857] R13: 00000000200000c0 R14: 00007f20938e6000 R15: 00000000200002c0 11:36:32 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 15) 11:36:32 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 5) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:36:32 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 17) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:36:32 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f00000012c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_QOS_MAP(r8, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000001300)={0x1c, r9, 0x1, 0x0, 0x0, {{0x75}, {@val={0x8, 0x3, r7}, @void}}}, 0x1c}}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r8, 0x40286608, &(0x7f0000000180)={0x401, 0xed4, 0x4, 0x896, 0x80}) fork() 11:36:32 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xee00, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) [ 1745.066786] FAULT_INJECTION: forcing a failure. [ 1745.066786] name failslab, interval 1, probability 0, space 0, times 0 [ 1745.067946] CPU: 0 PID: 18937 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1745.068619] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1745.069269] Call Trace: [ 1745.069485] dump_stack+0x107/0x167 [ 1745.069785] should_fail.cold+0x5/0xa [ 1745.070091] ? create_object.isra.0+0x3a/0xa20 [ 1745.070452] should_failslab+0x5/0x20 [ 1745.070752] kmem_cache_alloc+0x5b/0x310 [ 1745.071076] create_object.isra.0+0x3a/0xa20 [ 1745.071419] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1745.071835] __kmalloc_track_caller+0x177/0x370 [ 1745.072214] ? strndup_user+0x74/0xe0 [ 1745.072360] FAULT_INJECTION: forcing a failure. [ 1745.072360] name failslab, interval 1, probability 0, space 0, times 0 [ 1745.072522] ? getname_flags.part.0+0x1dd/0x4f0 [ 1745.072536] memdup_user+0x22/0xd0 [ 1745.072547] strndup_user+0x74/0xe0 [ 1745.072566] __x64_sys_mount+0x133/0x300 [ 1745.075493] ? copy_mnt_ns+0xa00/0xa00 [ 1745.075805] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1745.076230] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1745.076648] do_syscall_64+0x33/0x40 [ 1745.076948] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1745.077359] RIP: 0033:0x7fa51a61504a [ 1745.077661] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1745.079113] RSP: 002b:00007fa517b88fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1745.079709] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa51a61504a [ 1745.080277] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1745.080852] RBP: 00007fa517b89040 R08: 00007fa517b89040 R09: 0000000020000040 [ 1745.081419] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1745.082002] R13: 00000000200000c0 R14: 00007fa517b89000 R15: 00000000200002c0 [ 1745.082587] CPU: 1 PID: 18934 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1745.083693] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1745.084979] Call Trace: [ 1745.085392] dump_stack+0x107/0x167 [ 1745.085968] should_fail.cold+0x5/0xa [ 1745.086560] ? create_object.isra.0+0x3a/0xa20 [ 1745.087286] should_failslab+0x5/0x20 [ 1745.087880] kmem_cache_alloc+0x5b/0x310 [ 1745.088519] create_object.isra.0+0x3a/0xa20 [ 1745.089196] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1745.089981] __kmalloc_node+0x1ae/0x420 [ 1745.090619] kvmalloc_node+0x119/0x170 [ 1745.091229] alloc_fdtable+0xd3/0x280 [ 1745.091816] dup_fd+0x74d/0xcf0 [ 1745.092342] ? security_task_alloc+0xe6/0x260 [ 1745.093049] copy_process+0x197e/0x7800 [ 1745.093669] ? __lock_acquire+0xbb1/0x5b00 [ 1745.094353] ? __cleanup_sighand+0xb0/0xb0 [ 1745.095016] ? lock_acquire+0x197/0x470 [ 1745.095637] ? find_held_lock+0x2c/0x110 [ 1745.096270] kernel_clone+0xe7/0x980 [ 1745.096859] ? lock_downgrade+0x6d0/0x6d0 [ 1745.097500] ? find_held_lock+0x2c/0x110 [ 1745.098135] ? create_io_thread+0xf0/0xf0 [ 1745.098777] ? ksys_write+0x12d/0x260 [ 1745.099380] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1745.100118] __do_sys_fork+0x8a/0xc0 [ 1745.100690] ? kernel_thread+0xf0/0xf0 [ 1745.101289] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1745.102093] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1745.102861] ? trace_hardirqs_on+0x5b/0x180 [ 1745.103518] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1745.104304] do_syscall_64+0x33/0x40 [ 1745.104866] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1745.105647] RIP: 0033:0x7fe69fe62b19 [ 1745.106214] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1745.108986] RSP: 002b:00007fe69d3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1745.110139] RAX: ffffffffffffffda RBX: 00007fe69ff75f60 RCX: 00007fe69fe62b19 [ 1745.111235] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1745.112332] RBP: 00007fe69d3d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1745.113443] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1745.114544] R13: 00007ffffc31f9df R14: 00007fe69d3d8300 R15: 0000000000022000 11:36:32 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 18) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) [ 1745.136819] FAULT_INJECTION: forcing a failure. [ 1745.136819] name failslab, interval 1, probability 0, space 0, times 0 [ 1745.138954] CPU: 1 PID: 18938 Comm: syz-executor.5 Not tainted 5.10.209 #1 [ 1745.140033] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1745.141326] Call Trace: [ 1745.141742] dump_stack+0x107/0x167 [ 1745.142319] should_fail.cold+0x5/0xa [ 1745.142904] should_failslab+0x5/0x20 [ 1745.143489] __kmalloc_track_caller+0x79/0x370 [ 1745.144181] ? match_number+0xaf/0x1d0 [ 1745.144791] kmemdup_nul+0x2d/0xa0 [ 1745.145346] match_number+0xaf/0x1d0 [ 1745.145911] ? match_u64+0x190/0x190 [ 1745.146477] ? list_lru_walk_node+0x209/0x2b0 [ 1745.147159] ? lock_downgrade+0x6d0/0x6d0 [ 1745.147808] tracefs_parse_options+0x36b/0x550 [ 1745.148528] ? tracefs_show_options+0x1e0/0x1e0 [ 1745.149243] ? get_nr_dirty_inodes+0x19e/0x220 [ 1745.150109] ? __sync_blockdev+0xbe/0xf0 [ 1745.150741] ? sync_filesystem.part.0+0x191/0x1f0 [ 1745.151489] tracefs_remount+0x48/0x90 [ 1745.152092] ? tracefs_apply_options.isra.0+0x950/0x950 [ 1745.152924] legacy_reconfigure+0x11b/0x190 [ 1745.153587] reconfigure_super+0x414/0x9c0 [ 1745.154240] ? fs_umode_to_dtype+0xb0/0xb0 [ 1745.154892] path_mount+0x1ae0/0x2120 [ 1745.155477] ? strncpy_from_user+0x9e/0x470 [ 1745.156144] ? finish_automount+0xa90/0xa90 [ 1745.156815] ? getname_flags.part.0+0x1dd/0x4f0 [ 1745.157724] __x64_sys_mount+0x282/0x300 [ 1745.158431] ? copy_mnt_ns+0xa00/0xa00 [ 1745.159030] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1745.159831] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1745.160615] do_syscall_64+0x33/0x40 [ 1745.161176] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1745.161946] RIP: 0033:0x7f209637204a [ 1745.162508] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1745.165291] RSP: 002b:00007f20938e5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1745.166452] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f209637204a [ 1745.167531] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1745.168716] RBP: 00007f20938e6040 R08: 00007f20938e6040 R09: 0000000020000040 [ 1745.170080] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1745.171256] R13: 00000000200000c0 R14: 00007f20938e6000 R15: 00000000200002c0 [ 1745.193472] FAULT_INJECTION: forcing a failure. [ 1745.193472] name failslab, interval 1, probability 0, space 0, times 0 [ 1745.195809] CPU: 1 PID: 19042 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1745.197184] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1745.198990] Call Trace: [ 1745.199572] dump_stack+0x107/0x167 [ 1745.200342] should_fail.cold+0x5/0xa [ 1745.201114] ? create_object.isra.0+0x3a/0xa20 [ 1745.202159] should_failslab+0x5/0x20 [ 1745.203027] kmem_cache_alloc+0x5b/0x310 [ 1745.203823] create_object.isra.0+0x3a/0xa20 [ 1745.204615] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1745.205526] __kmalloc_track_caller+0x177/0x370 [ 1745.206353] ? match_number+0xaf/0x1d0 [ 1745.207052] kmemdup_nul+0x2d/0xa0 [ 1745.207680] match_number+0xaf/0x1d0 [ 1745.208340] ? match_u64+0x190/0x190 [ 1745.209046] ? list_lru_walk_node+0x209/0x2b0 [ 1745.209868] ? lock_downgrade+0x6d0/0x6d0 [ 1745.210693] tracefs_parse_options+0x36b/0x550 [ 1745.211585] ? tracefs_show_options+0x1e0/0x1e0 [ 1745.212415] ? get_nr_dirty_inodes+0x19e/0x220 [ 1745.213256] ? __sync_blockdev+0xbe/0xf0 [ 1745.214129] ? sync_filesystem.part.0+0x191/0x1f0 [ 1745.215147] tracefs_remount+0x48/0x90 [ 1745.215859] ? tracefs_apply_options.isra.0+0x950/0x950 [ 1745.216833] legacy_reconfigure+0x11b/0x190 [ 1745.217599] reconfigure_super+0x414/0x9c0 [ 1745.218354] ? fs_umode_to_dtype+0xb0/0xb0 [ 1745.219114] path_mount+0x1ae0/0x2120 [ 1745.219888] ? strncpy_from_user+0x9e/0x470 [ 1745.220664] ? finish_automount+0xa90/0xa90 [ 1745.221430] ? getname_flags.part.0+0x1dd/0x4f0 [ 1745.222281] __x64_sys_mount+0x282/0x300 [ 1745.223176] ? copy_mnt_ns+0xa00/0xa00 [ 1745.223902] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1745.224827] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1745.225740] do_syscall_64+0x33/0x40 [ 1745.226396] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1745.227312] RIP: 0033:0x7f168587204a [ 1745.227980] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1745.231256] RSP: 002b:00007f1682de5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1745.232626] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f168587204a [ 1745.233903] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1745.235173] RBP: 00007f1682de6040 R08: 00007f1682de6040 R09: 0000000020000040 [ 1745.236552] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1745.237893] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 11:36:45 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x80000, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:36:45 executing program 3: r0 = syz_io_uring_setup(0x4d51, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) io_uring_enter(r0, 0xf04, 0x41f0, 0x2, &(0x7f00000009c0)={[0x8]}, 0x8) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000940)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000980)={@mcast2, 0x0, 0x1, 0xff, 0x2, 0xfff9, 0x6}, 0x20) fork() r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000008, 0x12, r0, 0x0) r6 = mmap$IORING_OFF_SQES(&(0x7f00003f5000/0x1000)=nil, 0x1000, 0x6, 0x2010, r0, 0x10000000) syz_io_uring_submit(r5, r6, &(0x7f0000000900)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r4, 0x2, &(0x7f0000000840)=[{&(0x7f0000000180)="f9b53354a047964320504216a3d916e66ade1b1b75376364e98a98e1b831facadff7772ab340f6982160727b0bb2c2c794fd30bed8d51c734be1df1976252dc375cfa4b6a07460bcbb6f55b9da398e49d14301cc702db0912c58ec83a7e627a3736d35b03893a87232c579c19f309ace0832a0cdb064fa0ad511af1c33aba6a904cefed8e22e1a507c27201e8771690585d6f270640bdf5a", 0x98}, {&(0x7f0000000240)="429b", 0x2}, {&(0x7f0000000340)="9dd332ae51480cfe06ef69bfbaa78e02018efa771f8002e212c1547bc0cb51b5de23de64aef432def87a91eb8655d1e222cfc3b065b6819a76befb0e611f2ee553aab75803b26c4f350484ac72e65db9dc9a992e0177d5cd0c1542a3fa3b23a63b0a35ca1a5726e7396676fca07dba84ad1ef3b7683affd3b2ba8403914ab943e52bbd154711243ffce453b42edc1254a01fe24536d1439efc7982", 0x9b}, {&(0x7f0000000400)="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", 0xff}, {&(0x7f0000000280)="1f541bf658e82fa20ec4c9fc5b3c8fa2eda332a9752972b5ae958e5445ef65b5aada", 0x22}, {&(0x7f0000000500)="5376bbc3b25476b75b371aff3d61a8eddc", 0x11}, {&(0x7f0000000540)="dee25005f5d486c4a5cbadbe6c039a5bca8ff085adb1497dfe9173c64a7cddbb7adeab4f7f2c12ffc6c6f6a1fef4f4c0485deaff6dbceb932cd85f00acab1edb6aa94dfafd7752ab170b753dc813eb11f4b2a941f152e4ca104ceece807b04a467f99b3bb79ea23a81eac00f89745fec0695c154daf581c592a8d16eb5facacfa8515e02d7b18981542ee9d0c3b2ce15c3575a5d6ed1fcae1d65841468adf3b0daecfee8b01b1488ad03d796aa6389b4502fb528d818e0ae55e75da85bea2de8263d8505eeaac26ae46a2f2c36a6793a81c2fdcf3d743fbcb9821c6d2eb63cb75167c3387ee3cbad236e4c009b10ac1b25922fd2ff7412d39d", 0xf9}, {&(0x7f0000000640)="1127297647b6e5c1719f1c46bd52a8ba121bd8604d93112d184a74a5a7ea017e010a0013dea0f7f0bd003c7ab31c2d15fd8b8179dfb889770b73d4d5079084293c7063339227a23baf8ede31c6e251d5931cf120733ea556a1c9a5f3a49581e0b6c36bfef6c79d94f67120b865017bf7605a15c9da904b05d7e6c0b390ae88f848d96802fccc74346e291f8cb365a4eb603878ef75bd2732e11592e5befe4e8a890f2dbf1fd4addf3906417aec86ebf544fb65cf1869fdf3871d9e27668e72fb796f49ffee33a0a423c7b8181bb8bdfc11d1913cac7a2b9bf19ccc41026c21e2f45c", 0xe2}, {&(0x7f0000000740)="37a2cbca5d962c224ce9e74e1d3baef56dc6296ee3b36ad5c5e7d291d5cfef4af8996490de0649cc8f6cd19a3b53589a2d75ab2f31cc2e72361cfffe4819edeb3673cc8f3a6ac8c19d43e9ada319c4dcdafb338060eee0ad5c915688b33a160834fd79ddc01daeedafa1d8a0f834168709defe73ca8e1c926fcf2db10f15d003c4449b2a278e4abe5253ede3501f358de64c4a4540ef1f49d8c8c5743d168fa885e0ca32e9e6877a865087ec3d99b15fe7cbe2f059bc4b64126651967e14e299c2b724a933c1a9f0333b179e74202172c8169f321ed051c6db55", 0xda}], 0x9, 0xc}, 0x7) 11:36:45 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 19) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:36:45 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 6) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:36:45 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 18) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:36:45 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 16) 11:36:45 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() r6 = syz_open_procfs(0x0, &(0x7f0000000180)='environ\x00') readv(r6, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) getsockopt$inet_int(r6, 0x0, 0x18, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 11:36:45 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_setup(0x522f, &(0x7f0000000180)={0x0, 0xbafa, 0x20, 0x2, 0x3b5, 0x0, r0}, &(0x7f0000b97000/0xa000)=nil, &(0x7f000010a000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000280)=0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000000440)=@IORING_OP_STATX={0x15, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000400)='./file0\x00', 0x400, 0x0, 0x0, {0x0, r4}}, 0x10001) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) r6 = syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r9, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$nl80211(&(0x7f00000012c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_QOS_MAP(r11, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000001300)={0x1c, r12, 0x1, 0x0, 0x0, {{0x75}, {@val={0x8, 0x3, r10}, @void}}}, 0x1c}}, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000000600)=@IORING_OP_SPLICE={0x1e, 0x3, 0x0, @fd, 0x3, {0x0, r11}, 0x1, 0x8, 0x0, {0x0, r4, r6}}, 0x81) [ 1758.940390] FAULT_INJECTION: forcing a failure. [ 1758.940390] name failslab, interval 1, probability 0, space 0, times 0 [ 1758.942629] CPU: 0 PID: 19157 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1758.943718] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1758.945031] Call Trace: [ 1758.945455] dump_stack+0x107/0x167 [ 1758.946039] should_fail.cold+0x5/0xa [ 1758.946645] should_failslab+0x5/0x20 [ 1758.947250] __kmalloc_track_caller+0x79/0x370 [ 1758.947969] ? match_number+0xaf/0x1d0 [ 1758.948585] ? kfree+0xd7/0x340 [ 1758.949128] kmemdup_nul+0x2d/0xa0 [ 1758.949681] match_number+0xaf/0x1d0 [ 1758.950270] ? match_u64+0x190/0x190 [ 1758.950852] ? list_lru_walk_node+0x209/0x2b0 [ 1758.951571] tracefs_parse_options+0x209/0x550 [ 1758.952285] ? tracefs_show_options+0x1e0/0x1e0 [ 1758.953030] ? get_nr_dirty_inodes+0x19e/0x220 [ 1758.953747] ? __sync_blockdev+0xbe/0xf0 [ 1758.954391] ? sync_filesystem.part.0+0x191/0x1f0 [ 1758.955147] tracefs_remount+0x48/0x90 [ 1758.955765] ? tracefs_apply_options.isra.0+0x950/0x950 [ 1758.956606] legacy_reconfigure+0x11b/0x190 [ 1758.957285] reconfigure_super+0x414/0x9c0 [ 1758.957954] ? fs_umode_to_dtype+0xb0/0xb0 [ 1758.958628] path_mount+0x1ae0/0x2120 [ 1758.959227] ? strncpy_from_user+0x9e/0x470 [ 1758.959907] ? finish_automount+0xa90/0xa90 [ 1758.960577] ? getname_flags.part.0+0x1dd/0x4f0 [ 1758.961320] __x64_sys_mount+0x282/0x300 [ 1758.961960] ? copy_mnt_ns+0xa00/0xa00 [ 1758.962577] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1758.963394] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1758.964195] do_syscall_64+0x33/0x40 [ 1758.964785] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1758.965573] RIP: 0033:0x7f168587204a [ 1758.966162] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1758.968986] RSP: 002b:00007f1682de5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1758.970180] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f168587204a [ 1758.971295] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1758.972413] RBP: 00007f1682de6040 R08: 00007f1682de6040 R09: 0000000020000040 [ 1758.973530] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1758.974656] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 [ 1759.002656] FAULT_INJECTION: forcing a failure. [ 1759.002656] name failslab, interval 1, probability 0, space 0, times 0 [ 1759.005131] CPU: 0 PID: 19161 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1759.006239] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1759.007535] Call Trace: [ 1759.007958] dump_stack+0x107/0x167 [ 1759.008551] should_fail.cold+0x5/0xa [ 1759.009178] ? kvmalloc_node+0x119/0x170 [ 1759.009825] should_failslab+0x5/0x20 [ 1759.010428] __kmalloc_node+0x76/0x420 [ 1759.011057] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1759.011867] kvmalloc_node+0x119/0x170 [ 1759.012480] alloc_fdtable+0x13f/0x280 [ 1759.013118] dup_fd+0x74d/0xcf0 [ 1759.013653] ? security_task_alloc+0xe6/0x260 [ 1759.014361] copy_process+0x197e/0x7800 [ 1759.014992] ? __lock_acquire+0xbb1/0x5b00 [ 1759.015689] ? __cleanup_sighand+0xb0/0xb0 [ 1759.016364] ? lock_acquire+0x197/0x470 [ 1759.017019] ? find_held_lock+0x2c/0x110 [ 1759.017670] kernel_clone+0xe7/0x980 [ 1759.018261] ? lock_downgrade+0x6d0/0x6d0 [ 1759.018920] ? find_held_lock+0x2c/0x110 [ 1759.019572] ? create_io_thread+0xf0/0xf0 [ 1759.020233] ? ksys_write+0x12d/0x260 [ 1759.020863] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1759.021639] __do_sys_fork+0x8a/0xc0 [ 1759.022234] ? kernel_thread+0xf0/0xf0 [ 1759.022870] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1759.023705] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1759.024508] ? trace_hardirqs_on+0x5b/0x180 [ 1759.025239] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1759.026050] do_syscall_64+0x33/0x40 [ 1759.026638] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1759.027440] RIP: 0033:0x7fe69fe62b19 [ 1759.028022] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1759.030884] RSP: 002b:00007fe69d3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1759.032070] RAX: ffffffffffffffda RBX: 00007fe69ff75f60 RCX: 00007fe69fe62b19 [ 1759.033195] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1759.034300] RBP: 00007fe69d3d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1759.035410] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1759.036526] R13: 00007ffffc31f9df R14: 00007fe69d3d8300 R15: 0000000000022000 [ 1759.045495] FAULT_INJECTION: forcing a failure. [ 1759.045495] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1759.047555] CPU: 0 PID: 19166 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1759.048642] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1759.049914] Call Trace: [ 1759.050330] dump_stack+0x107/0x167 [ 1759.050897] should_fail.cold+0x5/0xa [ 1759.051503] _copy_from_user+0x2e/0x1b0 [ 1759.052132] memdup_user+0x65/0xd0 [ 1759.052697] strndup_user+0x74/0xe0 [ 1759.053257] __x64_sys_mount+0x133/0x300 [ 1759.053893] ? copy_mnt_ns+0xa00/0xa00 [ 1759.054493] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1759.055487] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1759.056293] do_syscall_64+0x33/0x40 [ 1759.056877] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1759.057664] RIP: 0033:0x7fa51a61504a [ 1759.058245] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1759.061063] RSP: 002b:00007fa517b88fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1759.062244] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa51a61504a [ 1759.063340] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1759.064423] RBP: 00007fa517b89040 R08: 00007fa517b89040 R09: 0000000020000040 [ 1759.065507] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1759.066599] R13: 00000000200000c0 R14: 00007fa517b89000 R15: 00000000200002c0 11:36:46 executing program 7: prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000400)) clock_gettime(0x1, &(0x7f0000000180)) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0xf200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r5, r6, &(0x7f00000018c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r7, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0, 0x4c561903a7c10053}, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) syz_io_uring_submit(r3, r6, &(0x7f0000000280)=@IORING_OP_TIMEOUT={0xb, 0x1, 0x0, 0x0, 0xa, &(0x7f0000000200)={r8, r9+10000000}, 0x1, 0x0, 0x1}, 0x800000) r10 = socket(0x8, 0x800, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r10, 0x942e, 0x0) fork() 11:36:46 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xee0000, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:36:46 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:36:46 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 7) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:36:46 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 17) [ 1759.380768] FAULT_INJECTION: forcing a failure. [ 1759.380768] name failslab, interval 1, probability 0, space 0, times 0 [ 1759.381848] CPU: 1 PID: 19690 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1759.382468] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1759.383180] Call Trace: [ 1759.383429] dump_stack+0x107/0x167 [ 1759.383747] should_fail.cold+0x5/0xa [ 1759.384105] ? create_object.isra.0+0x3a/0xa20 [ 1759.384618] should_failslab+0x5/0x20 [ 1759.385068] kmem_cache_alloc+0x5b/0x310 [ 1759.385429] create_object.isra.0+0x3a/0xa20 [ 1759.385908] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1759.386351] __kmalloc_node+0x1ae/0x420 [ 1759.386755] kvmalloc_node+0x119/0x170 [ 1759.387230] alloc_fdtable+0x13f/0x280 [ 1759.387689] dup_fd+0x74d/0xcf0 [ 1759.387981] ? security_task_alloc+0xe6/0x260 [ 1759.388371] copy_process+0x197e/0x7800 [ 1759.388737] ? __lock_acquire+0xbb1/0x5b00 [ 1759.389118] ? __cleanup_sighand+0xb0/0xb0 [ 1759.389489] ? lock_acquire+0x197/0x470 [ 1759.389963] ? find_held_lock+0x2c/0x110 [ 1759.390322] kernel_clone+0xe7/0x980 [ 1759.390652] ? lock_downgrade+0x6d0/0x6d0 [ 1759.391007] ? find_held_lock+0x2c/0x110 [ 1759.391359] ? create_io_thread+0xf0/0xf0 [ 1759.391723] ? ksys_write+0x12d/0x260 [ 1759.392062] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1759.392482] __do_sys_fork+0x8a/0xc0 [ 1759.392814] ? kernel_thread+0xf0/0xf0 [ 1759.393167] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1759.393623] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1759.394064] ? trace_hardirqs_on+0x5b/0x180 [ 1759.394434] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1759.394881] do_syscall_64+0x33/0x40 [ 1759.395198] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1759.395633] RIP: 0033:0x7fe69fe62b19 [ 1759.395955] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1759.397535] RSP: 002b:00007fe69d3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1759.398324] RAX: ffffffffffffffda RBX: 00007fe69ff75f60 RCX: 00007fe69fe62b19 [ 1759.399048] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1759.399682] RBP: 00007fe69d3d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1759.400308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1759.400928] R13: 00007ffffc31f9df R14: 00007fe69d3d8300 R15: 0000000000022000 [ 1759.414215] FAULT_INJECTION: forcing a failure. [ 1759.414215] name failslab, interval 1, probability 0, space 0, times 0 [ 1759.416363] CPU: 0 PID: 19692 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1759.417488] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1759.418820] Call Trace: [ 1759.419249] dump_stack+0x107/0x167 [ 1759.419844] should_fail.cold+0x5/0xa [ 1759.420467] ? copy_mount_options+0x55/0x180 [ 1759.421178] should_failslab+0x5/0x20 [ 1759.421788] kmem_cache_alloc_trace+0x55/0x320 [ 1759.422514] ? _copy_from_user+0xfb/0x1b0 [ 1759.423191] copy_mount_options+0x55/0x180 [ 1759.423865] __x64_sys_mount+0x1a8/0x300 [ 1759.424509] ? copy_mnt_ns+0xa00/0xa00 [ 1759.425134] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1759.425963] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1759.426775] do_syscall_64+0x33/0x40 [ 1759.427372] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1759.428176] RIP: 0033:0x7fa51a61504a [ 1759.428778] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1759.431654] RSP: 002b:00007fa517b88fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1759.432814] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa51a61504a [ 1759.433921] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1759.435043] RBP: 00007fa517b89040 R08: 00007fa517b89040 R09: 0000000020000040 [ 1759.436160] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1759.437300] R13: 00000000200000c0 R14: 00007fa517b89000 R15: 00000000200002c0 11:37:00 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 20) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:37:00 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r5) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r5, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)={0x27c, r6, 0x200, 0x70bd2c, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x1000, 0x5e}}}}, [@fils_params=[@NL80211_ATTR_FILS_ERP_USERNAME={0xb, 0xf9, "518e7f3ca92cc7"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x8000}], @NL80211_ATTR_IE={0xd9, 0x2a, [@perr={0x84, 0xf, {0x6, 0x1, [@not_ext={{}, @broadcast, 0x9, "", 0x3b}]}}, @sec_chan_ofs={0x3e, 0x1}, @challenge={0x10, 0x1, 0x1c}, @measure_req={0x26, 0x9d, {0x7, 0x3, 0x1, "0705fd5dd090016a97387935ee261732fca4b9327cbc935db415f4b0f10fb15af71a89654e581aea18a5e71ba2cc46106e6e7eb9459335a6cff97d13ed4f1bb0bbc94cf3ef351197124ca61accdcd7f2e29dca553947b0061b425b58ad6ceddb6f923a8796c462267071f2e6357479bf2caf976bb12395d5af01baa58676adeaa53d7350cd93e6e36ad8c155c27a74f5e1215cd33a87746d28f3"}}, @ibss={0x6, 0x2, 0x4d}, @sec_chan_ofs={0x3e, 0x1, 0x3}, @ssid={0x0, 0x6, @default_ibss_ssid}, @cf={0x4, 0x6, {0x2, 0xe8, 0x3, 0x6}}, @gcr_ga={0xbd, 0x6}]}, @NL80211_ATTR_IE={0x16c, 0x2a, [@preq={0x82, 0x78, @ext={{0x0, 0x0, 0x1}, 0x9, 0x9, 0x80000000, @device_a, 0xd6, @broadcast, 0x7, 0x660a, 0x8, [{{0x1, 0x0, 0x1}, @broadcast, 0x6}, {{}, @device_a, 0x1}, {{}, @device_a, 0x4}, {{0x1, 0x0, 0x1}, @device_b, 0x7}, {{}, @broadcast, 0x2}, {{0x1}, @device_a, 0x93}, {{0x1}, @broadcast, 0x40}, {{0x1, 0x0, 0x1}, @device_b, 0x1}]}}, @fast_bss_trans={0x37, 0x6b, {0x3, 0x2, "133051a50f081fac6e3bd7cf153168e3", "b7e0e79f41c766120f774ffd5bee956288f15a60384b7bed79743fcefde22fac", "f1b50753a83b11720d83bebbe5975b0825152ce9a17b5eeb231003500cf3d815", [{0x3, 0xb, "25b64543f5ea14b237d26d"}, {0x2, 0xa, "d9da51bbf83ada8294b4"}]}}, @sec_chan_ofs={0x3e, 0x1, 0x2}, @ssid={0x0, 0xb, @random="4640c0ca28703f4d1b4946"}, @prep={0x83, 0x25, @ext={{}, 0x1, 0x1, @broadcast, 0x1, @broadcast, 0x7fff, 0x7fff, @broadcast}}, @rann={0x7e, 0x15, {{0x0, 0x2}, 0x80, 0x47, @device_b, 0x10001, 0x0, 0x2}}, @mesh_config={0x71, 0x7, {0xffffffffffffffff, 0x0, 0x0, 0x1, 0x1, 0x2, 0x28}}, @prep={0x83, 0x25, @ext={{}, 0x9, 0x7, @device_b, 0x2, @device_b, 0x6, 0x80, @broadcast, 0x80000001}}, @dsss={0x3, 0x1, 0x84}]}]}, 0x27c}, 0x1, 0x0, 0x0, 0x80}, 0x4) fork() 11:37:00 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 8) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:37:00 executing program 7: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x4, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000180)=""/143, 0x8f}], 0x1, 0x11, 0x1}, 0x1) fork() 11:37:00 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:37:00 executing program 3: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x10, r4, 0x0) r6 = syz_io_uring_complete(r5) r7 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000000300)=0x0, 0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) r10 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r10, &(0x7f0000000580)=[{&(0x7f0000000400)=""/99, 0x63}, {&(0x7f0000000480)=""/218, 0xda}], 0x2) syz_io_uring_submit(r8, 0x0, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x18, 0x0, 0x0, {0x0, r9}}, 0x0) syz_io_uring_submit(r5, r0, &(0x7f0000000340)=@IORING_OP_STATX={0x15, 0x5, 0x0, 0xffffffffffffff9c, &(0x7f0000000180), &(0x7f0000000280)='./file0\x00', 0x10, 0x100, 0x0, {0x0, r9}}, 0x1) getsockopt$bt_BT_DEFER_SETUP(r6, 0x112, 0x7, &(0x7f0000000380)=0x1, &(0x7f00000003c0)=0x4) fork() 11:37:00 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 18) 11:37:00 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x1000000, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) [ 1773.232811] FAULT_INJECTION: forcing a failure. [ 1773.232811] name failslab, interval 1, probability 0, space 0, times 0 [ 1773.235533] CPU: 1 PID: 19804 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1773.236820] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1773.238322] Call Trace: [ 1773.238789] dump_stack+0x107/0x167 [ 1773.239498] should_fail.cold+0x5/0xa [ 1773.240235] ? create_object.isra.0+0x3a/0xa20 [ 1773.241134] should_failslab+0x5/0x20 [ 1773.241878] kmem_cache_alloc+0x5b/0x310 [ 1773.242648] create_object.isra.0+0x3a/0xa20 [ 1773.243512] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1773.244446] kmem_cache_alloc_trace+0x151/0x320 [ 1773.245266] copy_mount_options+0x55/0x180 [ 1773.246084] __x64_sys_mount+0x1a8/0x300 [ 1773.246849] ? copy_mnt_ns+0xa00/0xa00 [ 1773.247482] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1773.248433] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1773.249387] do_syscall_64+0x33/0x40 [ 1773.249967] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1773.250912] RIP: 0033:0x7fa51a61504a [ 1773.251526] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1773.254692] RSP: 002b:00007fa517b88fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1773.255933] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa51a61504a [ 1773.257111] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1773.258273] RBP: 00007fa517b89040 R08: 00007fa517b89040 R09: 0000000020000040 [ 1773.258497] FAULT_INJECTION: forcing a failure. [ 1773.258497] name failslab, interval 1, probability 0, space 0, times 0 [ 1773.259408] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1773.259419] R13: 00000000200000c0 R14: 00007fa517b89000 R15: 00000000200002c0 [ 1773.264012] CPU: 0 PID: 19808 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1773.265049] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1773.266402] Call Trace: [ 1773.266873] dump_stack+0x107/0x167 [ 1773.267522] should_fail.cold+0x5/0xa [ 1773.268200] ? create_object.isra.0+0x3a/0xa20 [ 1773.269013] should_failslab+0x5/0x20 [ 1773.269679] kmem_cache_alloc+0x5b/0x310 [ 1773.270397] create_object.isra.0+0x3a/0xa20 [ 1773.271088] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1773.271867] __kmalloc_track_caller+0x177/0x370 [ 1773.272576] ? match_number+0xaf/0x1d0 [ 1773.273162] kmemdup_nul+0x2d/0xa0 [ 1773.273732] match_number+0xaf/0x1d0 [ 1773.274397] ? match_u64+0x190/0x190 [ 1773.274990] ? list_lru_walk_node+0x209/0x2b0 [ 1773.275677] tracefs_parse_options+0x209/0x550 [ 1773.276372] ? tracefs_show_options+0x1e0/0x1e0 [ 1773.277087] ? get_nr_dirty_inodes+0x19e/0x220 [ 1773.277785] ? __sync_blockdev+0xbe/0xf0 [ 1773.278396] ? sync_filesystem.part.0+0x191/0x1f0 [ 1773.279123] tracefs_remount+0x48/0x90 [ 1773.279712] ? tracefs_apply_options.isra.0+0x950/0x950 [ 1773.280482] legacy_reconfigure+0x11b/0x190 [ 1773.281148] reconfigure_super+0x414/0x9c0 [ 1773.281810] ? fs_umode_to_dtype+0xb0/0xb0 [ 1773.282455] path_mount+0x1ae0/0x2120 [ 1773.283042] ? strncpy_from_user+0x9e/0x470 [ 1773.283696] ? finish_automount+0xa90/0xa90 [ 1773.284349] ? getname_flags.part.0+0x1dd/0x4f0 [ 1773.285072] __x64_sys_mount+0x282/0x300 [ 1773.285681] ? copy_mnt_ns+0xa00/0xa00 [ 1773.286282] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1773.287074] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1773.287856] do_syscall_64+0x33/0x40 [ 1773.288395] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1773.289168] RIP: 0033:0x7f168587204a [ 1773.289731] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1773.292480] RSP: 002b:00007f1682de5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1773.293656] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f168587204a [ 1773.294223] FAULT_INJECTION: forcing a failure. [ 1773.294223] name failslab, interval 1, probability 0, space 0, times 0 [ 1773.294750] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1773.294771] RBP: 00007f1682de6040 R08: 00007f1682de6040 R09: 0000000020000040 [ 1773.298698] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1773.299797] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 [ 1773.301050] CPU: 1 PID: 19806 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1773.302200] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1773.303545] Call Trace: [ 1773.303987] dump_stack+0x107/0x167 [ 1773.304583] should_fail.cold+0x5/0xa [ 1773.305221] ? copy_fs_struct+0x45/0x340 [ 1773.305883] should_failslab+0x5/0x20 [ 1773.306506] kmem_cache_alloc+0x5b/0x310 [ 1773.307183] copy_fs_struct+0x45/0x340 [ 1773.307819] copy_process+0x3435/0x7800 [ 1773.308465] ? __lock_acquire+0xbb1/0x5b00 [ 1773.309190] ? __cleanup_sighand+0xb0/0xb0 [ 1773.309883] ? lock_acquire+0x197/0x470 [ 1773.310542] ? find_held_lock+0x2c/0x110 [ 1773.311218] kernel_clone+0xe7/0x980 [ 1773.311826] ? lock_downgrade+0x6d0/0x6d0 [ 1773.312502] ? find_held_lock+0x2c/0x110 [ 1773.313178] ? create_io_thread+0xf0/0xf0 [ 1773.313854] ? ksys_write+0x12d/0x260 [ 1773.314490] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1773.315289] __do_sys_fork+0x8a/0xc0 [ 1773.315899] ? kernel_thread+0xf0/0xf0 [ 1773.316551] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1773.317404] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1773.318301] ? trace_hardirqs_on+0x5b/0x180 [ 1773.319149] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1773.319987] do_syscall_64+0x33/0x40 [ 1773.320590] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1773.321426] RIP: 0033:0x7fe69fe62b19 [ 1773.322027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1773.325008] RSP: 002b:00007fe69d3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1773.326239] RAX: ffffffffffffffda RBX: 00007fe69ff75f60 RCX: 00007fe69fe62b19 [ 1773.327388] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1773.328538] RBP: 00007fe69d3d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1773.329697] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1773.330857] R13: 00007ffffc31f9df R14: 00007fe69d3d8300 R15: 0000000000022000 11:37:00 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 21) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:37:00 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x4, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:37:00 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 9) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) [ 1773.589645] FAULT_INJECTION: forcing a failure. [ 1773.589645] name failslab, interval 1, probability 0, space 0, times 0 [ 1773.591746] CPU: 1 PID: 20016 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1773.592826] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1773.594289] Call Trace: [ 1773.594825] dump_stack+0x107/0x167 [ 1773.595419] should_fail.cold+0x5/0xa [ 1773.596026] should_failslab+0x5/0x20 [ 1773.596632] __kmalloc_track_caller+0x79/0x370 [ 1773.597367] ? match_number+0xaf/0x1d0 [ 1773.597982] ? kfree+0xd7/0x340 [ 1773.598514] kmemdup_nul+0x2d/0xa0 [ 1773.599068] match_number+0xaf/0x1d0 [ 1773.599664] ? match_u64+0x190/0x190 [ 1773.600252] ? list_lru_walk_node+0x209/0x2b0 [ 1773.600959] tracefs_parse_options+0x36b/0x550 [ 1773.601685] ? tracefs_show_options+0x1e0/0x1e0 [ 1773.602421] ? get_nr_dirty_inodes+0x19e/0x220 [ 1773.603148] ? __sync_blockdev+0xbe/0xf0 [ 1773.603794] ? sync_filesystem.part.0+0x191/0x1f0 [ 1773.604562] tracefs_remount+0x48/0x90 [ 1773.605186] ? tracefs_apply_options.isra.0+0x950/0x950 [ 1773.606023] legacy_reconfigure+0x11b/0x190 [ 1773.606708] reconfigure_super+0x414/0x9c0 [ 1773.607362] ? fs_umode_to_dtype+0xb0/0xb0 [ 1773.608037] path_mount+0x1ae0/0x2120 [ 1773.608640] ? strncpy_from_user+0x9e/0x470 [ 1773.609332] ? finish_automount+0xa90/0xa90 [ 1773.610019] ? getname_flags.part.0+0x1dd/0x4f0 [ 1773.610762] __x64_sys_mount+0x282/0x300 [ 1773.611412] ? copy_mnt_ns+0xa00/0xa00 [ 1773.612035] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1773.612869] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1773.613667] do_syscall_64+0x33/0x40 [ 1773.614252] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1773.615034] RIP: 0033:0x7f168587204a [ 1773.615620] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1773.618398] RSP: 002b:00007f1682de5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1773.619595] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f168587204a [ 1773.620731] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1773.621861] RBP: 00007f1682de6040 R08: 00007f1682de6040 R09: 0000000020000040 [ 1773.622983] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1773.624116] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 [ 1773.652420] FAULT_INJECTION: forcing a failure. [ 1773.652420] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1773.654623] CPU: 1 PID: 20025 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1773.655735] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1773.657058] Call Trace: [ 1773.657486] dump_stack+0x107/0x167 [ 1773.658089] should_fail.cold+0x5/0xa [ 1773.658709] _copy_from_user+0x2e/0x1b0 [ 1773.659457] copy_mount_options+0x76/0x180 [ 1773.660179] __x64_sys_mount+0x1a8/0x300 [ 1773.660835] ? copy_mnt_ns+0xa00/0xa00 [ 1773.661460] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1773.662257] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1773.663098] do_syscall_64+0x33/0x40 [ 1773.663684] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1773.664491] RIP: 0033:0x7fa51a61504a [ 1773.665107] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1773.668019] RSP: 002b:00007fa517b88fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1773.669231] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa51a61504a [ 1773.670356] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1773.671481] RBP: 00007fa517b89040 R08: 00007fa517b89040 R09: 0000000020000040 [ 1773.672604] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1773.673732] R13: 00000000200000c0 R14: 00007fa517b89000 R15: 00000000200002c0 11:37:13 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x5, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:37:13 executing program 7: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) fsync(r1) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:37:13 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, 0xffffffffffffffff) syz_io_uring_complete(r3) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:37:13 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x2000000, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:37:13 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 19) 11:37:13 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:37:13 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 22) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:37:13 executing program 3: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) fallocate(r2, 0x8, 0x200, 0x9) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) fork() [ 1786.443375] FAULT_INJECTION: forcing a failure. [ 1786.443375] name failslab, interval 1, probability 0, space 0, times 0 [ 1786.444381] CPU: 1 PID: 20238 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1786.444993] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1786.445712] Call Trace: [ 1786.445946] dump_stack+0x107/0x167 [ 1786.446274] should_fail.cold+0x5/0xa [ 1786.446605] ? kvmalloc_node+0x119/0x170 [ 1786.446957] should_failslab+0x5/0x20 [ 1786.447284] __kmalloc_node+0x76/0x420 [ 1786.447613] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1786.448037] kvmalloc_node+0x119/0x170 [ 1786.448363] alloc_fdtable+0x13f/0x280 [ 1786.448694] dup_fd+0x74d/0xcf0 [ 1786.448990] ? security_task_alloc+0xe6/0x260 [ 1786.449379] copy_process+0x197e/0x7800 [ 1786.449734] ? __lock_acquire+0xbb1/0x5b00 [ 1786.450118] ? __cleanup_sighand+0xb0/0xb0 [ 1786.450484] ? lock_acquire+0x197/0x470 [ 1786.450820] ? find_held_lock+0x2c/0x110 [ 1786.451161] kernel_clone+0xe7/0x980 [ 1786.451467] ? lock_downgrade+0x6d0/0x6d0 [ 1786.451818] ? find_held_lock+0x2c/0x110 [ 1786.452165] ? create_io_thread+0xf0/0xf0 [ 1786.452522] ? ksys_write+0x12d/0x260 [ 1786.452848] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1786.453255] __do_sys_fork+0x8a/0xc0 [ 1786.453561] ? kernel_thread+0xf0/0xf0 [ 1786.453892] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1786.454328] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1786.454765] ? trace_hardirqs_on+0x5b/0x180 [ 1786.455124] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1786.455545] do_syscall_64+0x33/0x40 [ 1786.455855] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1786.456281] RIP: 0033:0x7fe69fe62b19 [ 1786.456606] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1786.458134] RSP: 002b:00007fe69d3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1786.458780] RAX: ffffffffffffffda RBX: 00007fe69ff75f60 RCX: 00007fe69fe62b19 [ 1786.459379] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1786.459985] RBP: 00007fe69d3d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1786.460569] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1786.461182] R13: 00007ffffc31f9df R14: 00007fe69d3d8300 R15: 0000000000022000 [ 1786.499304] FAULT_INJECTION: forcing a failure. [ 1786.499304] name failslab, interval 1, probability 0, space 0, times 0 [ 1786.500282] CPU: 1 PID: 20246 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1786.500840] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1786.501537] Call Trace: [ 1786.501767] dump_stack+0x107/0x167 [ 1786.502082] should_fail.cold+0x5/0xa [ 1786.502409] ? getname_flags.part.0+0x50/0x4f0 [ 1786.502802] should_failslab+0x5/0x20 [ 1786.503118] kmem_cache_alloc+0x5b/0x310 [ 1786.503463] getname_flags.part.0+0x50/0x4f0 [ 1786.503820] user_path_at_empty+0xa1/0x100 [ 1786.504171] __x64_sys_mount+0x1e9/0x300 [ 1786.504513] ? copy_mnt_ns+0xa00/0xa00 [ 1786.504697] FAULT_INJECTION: forcing a failure. [ 1786.504697] name failslab, interval 1, probability 0, space 0, times 0 [ 1786.504833] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1786.504843] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1786.504856] do_syscall_64+0x33/0x40 [ 1786.504864] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1786.504870] RIP: 0033:0x7fa51a61504a [ 1786.504879] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1786.504884] RSP: 002b:00007fa517b88fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1786.504894] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa51a61504a [ 1786.504899] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1786.504905] RBP: 00007fa517b89040 R08: 00007fa517b89040 R09: 0000000020000040 [ 1786.504910] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1786.504915] R13: 00000000200000c0 R14: 00007fa517b89000 R15: 00000000200002c0 [ 1786.521240] CPU: 0 PID: 20245 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1786.522274] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1786.523468] Call Trace: [ 1786.523863] dump_stack+0x107/0x167 [ 1786.524405] should_fail.cold+0x5/0xa [ 1786.524974] ? create_object.isra.0+0x3a/0xa20 [ 1786.525674] should_failslab+0x5/0x20 [ 1786.526258] kmem_cache_alloc+0x5b/0x310 [ 1786.526856] create_object.isra.0+0x3a/0xa20 [ 1786.527504] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1786.528275] __kmalloc_track_caller+0x177/0x370 [ 1786.528981] ? match_number+0xaf/0x1d0 [ 1786.529559] kmemdup_nul+0x2d/0xa0 [ 1786.530066] match_number+0xaf/0x1d0 [ 1786.530614] ? match_u64+0x190/0x190 [ 1786.531171] ? list_lru_walk_node+0x209/0x2b0 [ 1786.531836] tracefs_parse_options+0x36b/0x550 [ 1786.532519] ? tracefs_show_options+0x1e0/0x1e0 [ 1786.533214] ? get_nr_dirty_inodes+0x19e/0x220 [ 1786.533894] ? __sync_blockdev+0xbe/0xf0 [ 1786.534517] ? sync_filesystem.part.0+0x191/0x1f0 [ 1786.535227] tracefs_remount+0x48/0x90 [ 1786.535795] ? tracefs_apply_options.isra.0+0x950/0x950 [ 1786.536567] legacy_reconfigure+0x11b/0x190 [ 1786.537212] reconfigure_super+0x414/0x9c0 [ 1786.537814] ? fs_umode_to_dtype+0xb0/0xb0 [ 1786.538471] path_mount+0x1ae0/0x2120 [ 1786.539030] ? strncpy_from_user+0x9e/0x470 [ 1786.539660] ? finish_automount+0xa90/0xa90 [ 1786.540305] ? getname_flags.part.0+0x1dd/0x4f0 [ 1786.541000] __x64_sys_mount+0x282/0x300 [ 1786.541597] ? copy_mnt_ns+0xa00/0xa00 [ 1786.542180] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1786.542959] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1786.543720] do_syscall_64+0x33/0x40 [ 1786.544265] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1786.545003] RIP: 0033:0x7f168587204a [ 1786.545551] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1786.548274] RSP: 002b:00007f1682de5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1786.549388] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f168587204a [ 1786.550435] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1786.551471] RBP: 00007f1682de6040 R08: 00007f1682de6040 R09: 0000000020000040 [ 1786.552501] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1786.553558] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 11:37:13 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:37:13 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 20) [ 1786.617733] FAULT_INJECTION: forcing a failure. [ 1786.617733] name failslab, interval 1, probability 0, space 0, times 0 [ 1786.619512] CPU: 0 PID: 20422 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1786.620528] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1786.621742] Call Trace: [ 1786.622148] dump_stack+0x107/0x167 [ 1786.622693] should_fail.cold+0x5/0xa [ 1786.623261] ? copy_process+0x1add/0x7800 [ 1786.623879] should_failslab+0x5/0x20 [ 1786.624441] kmem_cache_alloc+0x5b/0x310 [ 1786.625059] ? _raw_spin_unlock+0x1a/0x30 [ 1786.625679] copy_process+0x1add/0x7800 [ 1786.626255] ? __lock_acquire+0xbb1/0x5b00 [ 1786.626906] ? __cleanup_sighand+0xb0/0xb0 [ 1786.627552] ? lock_acquire+0x197/0x470 [ 1786.628152] ? find_held_lock+0x2c/0x110 [ 1786.628755] kernel_clone+0xe7/0x980 [ 1786.629324] ? lock_downgrade+0x6d0/0x6d0 [ 1786.629928] ? find_held_lock+0x2c/0x110 [ 1786.630530] ? create_io_thread+0xf0/0xf0 [ 1786.631151] ? ksys_write+0x12d/0x260 [ 1786.631722] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1786.632438] __do_sys_fork+0x8a/0xc0 [ 1786.633001] ? kernel_thread+0xf0/0xf0 [ 1786.633613] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1786.634395] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1786.635140] ? trace_hardirqs_on+0x5b/0x180 [ 1786.635769] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1786.636526] do_syscall_64+0x33/0x40 [ 1786.637081] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1786.637842] RIP: 0033:0x7fe69fe62b19 [ 1786.638405] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1786.641098] RSP: 002b:00007fe69d3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1786.642208] RAX: ffffffffffffffda RBX: 00007fe69ff75f60 RCX: 00007fe69fe62b19 [ 1786.643285] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1786.644329] RBP: 00007fe69d3d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1786.645387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1786.646435] R13: 00007ffffc31f9df R14: 00007fe69d3d8300 R15: 0000000000022000 11:37:13 executing program 7: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) syz_open_procfs(0x0, &(0x7f0000000180)='attr/current\x00') mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:37:13 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 11) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:37:13 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x4000000, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:37:13 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 23) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:37:13 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) memfd_create(&(0x7f0000000180)='\xaa\xaa\xaa\xaa\xaa', 0x5) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() [ 1786.771357] FAULT_INJECTION: forcing a failure. [ 1786.771357] name failslab, interval 1, probability 0, space 0, times 0 [ 1786.773308] CPU: 0 PID: 20588 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1786.774321] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1786.775557] Call Trace: [ 1786.775962] dump_stack+0x107/0x167 [ 1786.776506] should_fail.cold+0x5/0xa [ 1786.777081] ? create_object.isra.0+0x3a/0xa20 [ 1786.777748] should_failslab+0x5/0x20 [ 1786.778302] kmem_cache_alloc+0x5b/0x310 [ 1786.778883] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1786.779746] create_object.isra.0+0x3a/0xa20 [ 1786.780368] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1786.781118] kmem_cache_alloc+0x159/0x310 [ 1786.781719] getname_flags.part.0+0x50/0x4f0 [ 1786.782348] user_path_at_empty+0xa1/0x100 [ 1786.782945] __x64_sys_mount+0x1e9/0x300 [ 1786.783533] ? copy_mnt_ns+0xa00/0xa00 [ 1786.784083] ? copy_mnt_ns+0xa00/0xa00 [ 1786.784672] do_syscall_64+0x33/0x40 [ 1786.785226] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1786.785954] RIP: 0033:0x7fa51a61504a [ 1786.786484] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1786.789064] RSP: 002b:00007fa517b88fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1786.790133] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa51a61504a [ 1786.791126] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1786.792125] RBP: 00007fa517b89040 R08: 00007fa517b89040 R09: 0000000020000040 [ 1786.793165] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1786.794172] R13: 00000000200000c0 R14: 00007fa517b89000 R15: 00000000200002c0 11:37:13 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x9, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:37:13 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 21) 11:37:13 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x5000000, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) [ 1786.895719] FAULT_INJECTION: forcing a failure. [ 1786.895719] name failslab, interval 1, probability 0, space 0, times 0 [ 1786.897009] CPU: 1 PID: 20772 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1786.897561] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1786.898241] Call Trace: [ 1786.898460] dump_stack+0x107/0x167 [ 1786.898755] should_fail.cold+0x5/0xa [ 1786.899086] ? create_object.isra.0+0x3a/0xa20 [ 1786.899453] should_failslab+0x5/0x20 [ 1786.899758] kmem_cache_alloc+0x5b/0x310 [ 1786.900101] create_object.isra.0+0x3a/0xa20 [ 1786.900458] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1786.900869] kmem_cache_alloc+0x159/0x310 [ 1786.901219] copy_fs_struct+0x45/0x340 [ 1786.901537] copy_process+0x3435/0x7800 [ 1786.901861] ? __lock_acquire+0xbb1/0x5b00 [ 1786.902212] ? __cleanup_sighand+0xb0/0xb0 [ 1786.902561] ? lock_acquire+0x197/0x470 [ 1786.902885] ? find_held_lock+0x2c/0x110 [ 1786.903215] kernel_clone+0xe7/0x980 [ 1786.903515] ? lock_downgrade+0x6d0/0x6d0 [ 1786.903848] ? find_held_lock+0x2c/0x110 [ 1786.904177] ? create_io_thread+0xf0/0xf0 [ 1786.904512] ? ksys_write+0x12d/0x260 [ 1786.904826] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1786.905223] __do_sys_fork+0x8a/0xc0 [ 1786.905545] ? kernel_thread+0xf0/0xf0 [ 1786.906009] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1786.906427] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1786.906957] ? trace_hardirqs_on+0x5b/0x180 [ 1786.907312] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1786.907722] do_syscall_64+0x33/0x40 [ 1786.908042] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1786.908572] RIP: 0033:0x7fe69fe62b19 [ 1786.908995] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1786.910446] RSP: 002b:00007fe69d3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1786.911048] RAX: ffffffffffffffda RBX: 00007fe69ff75f60 RCX: 00007fe69fe62b19 [ 1786.911610] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1786.912175] RBP: 00007fe69d3d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1786.912738] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1786.913314] R13: 00007ffffc31f9df R14: 00007fe69d3d8300 R15: 0000000000022000 [ 1786.989355] FAULT_INJECTION: forcing a failure. [ 1786.989355] name failslab, interval 1, probability 0, space 0, times 0 [ 1786.991410] CPU: 0 PID: 20795 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1786.992408] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1786.993572] Call Trace: [ 1786.993955] dump_stack+0x107/0x167 [ 1786.994474] should_fail.cold+0x5/0xa [ 1786.995014] ? getname_flags.part.0+0x50/0x4f0 [ 1786.995662] should_failslab+0x5/0x20 [ 1786.996201] kmem_cache_alloc+0x5b/0x310 [ 1786.996776] getname_flags.part.0+0x50/0x4f0 [ 1786.997415] getname+0x8e/0xd0 [ 1786.997870] do_sys_openat2+0xf9/0x420 [ 1786.998426] ? ktime_get+0x158/0x1f0 [ 1786.998950] ? build_open_flags+0x6f0/0x6f0 [ 1786.999561] ? clockevents_program_event+0x131/0x360 [ 1787.000276] ? tick_program_event+0xa8/0x140 [ 1787.000908] __x64_sys_openat+0x13f/0x1f0 [ 1787.001502] ? __ia32_sys_open+0x1c0/0x1c0 [ 1787.002111] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1787.002855] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1787.003582] do_syscall_64+0x33/0x40 [ 1787.004107] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1787.004822] RIP: 0033:0x7f1685823a04 [ 1787.005352] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1787.007898] RSP: 002b:00007f1682de5f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1787.008977] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1685823a04 [ 1787.009965] RDX: 0000000000010000 RSI: 00000000200000c0 RDI: 00000000ffffff9c [ 1787.010960] RBP: 00000000200000c0 R08: 0000000000000000 R09: 0000000020000040 [ 1787.011948] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1787.012936] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 11:37:14 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x10, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:37:14 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 12) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:37:14 executing program 3: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x40, 0x55}, 0x18) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='environ\x00') readv(r4, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) getsockopt$inet6_int(r4, 0x29, 0x35, &(0x7f0000000180), &(0x7f00000001c0)=0x4) fork() 11:37:14 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r1, &(0x7f0000000180)=@IORING_OP_ASYNC_CANCEL={0xe, 0x2, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1, {0x0, r4}}, 0xa49) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r6, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() [ 1787.141774] FAULT_INJECTION: forcing a failure. [ 1787.141774] name failslab, interval 1, probability 0, space 0, times 0 [ 1787.145192] CPU: 0 PID: 21026 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1787.146178] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1787.147337] Call Trace: [ 1787.147723] dump_stack+0x107/0x167 [ 1787.148247] should_fail.cold+0x5/0xa [ 1787.148806] ? create_object.isra.0+0x3a/0xa20 [ 1787.149470] should_failslab+0x5/0x20 [ 1787.150018] kmem_cache_alloc+0x5b/0x310 [ 1787.150602] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1787.151358] create_object.isra.0+0x3a/0xa20 [ 1787.151991] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1787.152720] kmem_cache_alloc+0x159/0x310 [ 1787.153328] getname_flags.part.0+0x50/0x4f0 [ 1787.153966] user_path_at_empty+0xa1/0x100 [ 1787.154574] __x64_sys_mount+0x1e9/0x300 [ 1787.155162] ? copy_mnt_ns+0xa00/0xa00 [ 1787.155722] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1787.156471] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1787.157214] do_syscall_64+0x33/0x40 [ 1787.157743] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1787.158479] RIP: 0033:0x7fa51a61504a [ 1787.159016] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1787.161609] RSP: 002b:00007fa517b88fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1787.162686] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa51a61504a [ 1787.163697] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1787.164708] RBP: 00007fa517b89040 R08: 00007fa517b89040 R09: 0000000020000040 [ 1787.165731] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1787.166745] R13: 00000000200000c0 R14: 00007fa517b89000 R15: 00000000200002c0 11:37:27 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8000000, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:37:27 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 13) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:37:27 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x10, r3, 0x0) syz_io_uring_complete(r4) syz_io_uring_setup(0x1017, &(0x7f0000000900)={0x0, 0xf51d, 0x4, 0x1, 0x104, 0x0, r0}, &(0x7f00005df000/0x2000)=nil, &(0x7f0000b40000/0x4000)=nil, &(0x7f0000000980), &(0x7f00000009c0)=0x0) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000a00)=@IORING_OP_MADVISE={0x19, 0x7, 0x0, 0x0, 0x0, &(0x7f0000ab3000/0x4000)=nil, 0x4000, 0x3, 0x0, {0x0, r6}}, 0x6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$sock(r7, &(0x7f0000000880)={&(0x7f0000000180)=@generic={0xb, "fec15e73eea2d8289ed485c7036686efad3bcdb704c22d3e27b19cac1eb67372e3c5bfc43adf328f1b48b32096e0ad7b831ca60990d16ee31b1c9add404dafe8ecdd21b2de132290d209f3d04a04d7663eb624311c1273c00124a0ca3570f1e84926631eeda08078200a980d7c375f2850b9b58071985ab34d1f60dac2b5"}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)="35e5b883294d74b4076bac6764c772bced56334c32d84f12d18a79f33389247c39cc602118c9f7ff829355b8f80f2b475d43a183675fe4af28420ec750b97d6ba1c988b1b26985d0e2b9f5e2c27948ecd83311e663a52a16e05e75aa9e9ad07ca9f88dbc20bcc8ea0f26fc131927f71db4b71826426969c112db1aa21056366e3c024131bbd5159116fdecfacb79e9be3186195ba59c6e9bce880110ac77ccadaa2cbef7f05612353984af1b577f3caeb7776690ae307a906a65f2d9caffdb65993615352938eb842a20d5467b7934ad86c3e9141e39a15bab33c9a25fc151e090fac2f5001830a34720b98759", 0xed}, {&(0x7f0000000600)="e4227842a155ff1bee6d2a5ba215f8ea5ab15a1c30745adab72648604fae00d548498d4393eb039b18275eeaf7dfa37dda2f9688cae5880abb0b891e63035c50ac9b4eb4ece5975850fff4fb91f83ef0a9f673e369f3af5ea23e9d4980686e4e4e8c35b52c18e29f84f22ff4d1f02306da3faeb0356421956a46bf1d6b354dbe8b598cc3ba8138e18ff5fa8f3046", 0x8e}, {&(0x7f00000006c0)="9f4c11c6220103e5bd996a6489cf67e1f45cfefc9bcd94b14b7e4afc22e46bdc2c062eff059ec66e2ebc7258b45203afb1fca8a567db1a880a7f72ceba8b923976773edbf5648ff186e8525ff2d9a19ea39fe206fe4e8322fa8856453dd8a79c299c11b3f3be685e11b9b9509b8f08e45328011cb1b4dcc2fe932c6b1e3b3fc9c454075ee9081fb2ce", 0x89}, {&(0x7f0000000780)="bfbc017a2c203d384c0e381b04d5304c2dd0b2b35c6c1e159dded3e61dffc429ad03d499eda2578aef8652402cfc726889677b3e4d1cc7d5f67ea5d5875e1c4b4badbe61415127308953892057e9a3215956a334070f5f03a1cce90a305a94bb44ac105c0d8ce0888577f220e33af2a690b2878bec7aa48cb180ba74e4adf39f5b8d16962b22b371abd12a46f384e924e2f571306aa50f68816cb04ea72e40c3450fbd9fed126ad32a1b7e24e3d95a0c2831fbfc3d6d1c656e52eb41851e989ac6d8404a529cb9a744b6766a0b28f8a9956016a4dfd45bb71b9064810ef4", 0xde}, {&(0x7f0000000200)="fb092db58441ae218e8cf1602266301d483a35a34a18582fe7ed617119eaaba7cdf3b72f540238d87a7384a4a8e6a6", 0x2f}], 0x5, &(0x7f0000000280)=[@txtime={{0x18, 0x1, 0x3d, 0x10000}}, @mark={{0x14, 0x1, 0x24, 0x4}}], 0x30}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r8, 0x0) io_uring_enter(r0, 0x338, 0x2fdf, 0x1, &(0x7f0000000c00)={[0x8001]}, 0x8) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r9, r10, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() pwritev2(r0, &(0x7f0000000bc0)=[{&(0x7f0000000a40)="f24c2bc0378c986c0411121a84f1f59ff4568ddcda84b5b93264cc2ce458d8d81200c3fb73a691a8491ff72ad1fb9d46fae8ac", 0x33}, {&(0x7f0000000a80)="5748301d9fc2bd72b608e12586a225ff6bc6d2220f9fc4d248f877c66eb9b8e964782120fdcfaf019604982cd17979125d56c5c408c24f196b64ae90a70726722e8e79fba0e736a64525578318b8c507759f03d61614466f281772b8f813827884f24e5a1858aa511df8471a76791b064a0344", 0x73}, {&(0x7f0000000b00)="a8c6b57a47bf41d173e9db7062b3d409754a94ca3cd56928ea2144c01f6dde11c0bbdd2cdad2e118ce4f3c8f7d2d87743528db39467946e9c9cdf8c87bf181a39aef632e3e40d967be1a4a64ae07b53cfd3e93ddd31f5899e8a0aad13100ab726907c87da552216086bfcba7e2bc6bc40f8dbc2c3fa3a13361b7c9cea880c65c1bf63586f30c7af1edd51a308ca4615e8a34253ceb9c5e78f868e77b489ed0a3989ff5ea49f5201b01a10509c992ace3c6c7e24db830a779959eb7bc9b1a2b10", 0xc0}], 0x3, 0x4851e3ea, 0x7ff, 0x0) 11:37:27 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 22) 11:37:27 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x18, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:37:27 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000340)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000200)}], 0x1}, 0x0, 0x4008020}, 0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:37:27 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 24) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:37:27 executing program 3: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) fork() r4 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x80080) ioctl$sock_SIOCSIFBR(r4, 0x8941, &(0x7f00000001c0)=@generic={0x0, 0xeeb}) [ 1800.164295] FAULT_INJECTION: forcing a failure. [ 1800.164295] name failslab, interval 1, probability 0, space 0, times 0 [ 1800.166388] CPU: 1 PID: 21308 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1800.166760] FAULT_INJECTION: forcing a failure. [ 1800.166760] name failslab, interval 1, probability 0, space 0, times 0 [ 1800.167525] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1800.167541] Call Trace: [ 1800.171084] dump_stack+0x107/0x167 [ 1800.171683] should_fail.cold+0x5/0xa [ 1800.172317] ? alloc_fs_context+0x57/0x840 [ 1800.173015] should_failslab+0x5/0x20 [ 1800.173645] kmem_cache_alloc_trace+0x55/0x320 [ 1800.174395] ? cap_capable+0x1cd/0x230 [ 1800.175038] alloc_fs_context+0x57/0x840 [ 1800.175708] path_mount+0x962/0x2120 [ 1800.176326] ? strncpy_from_user+0x9e/0x470 [ 1800.177038] ? finish_automount+0xa90/0xa90 [ 1800.177746] ? getname_flags.part.0+0x1dd/0x4f0 [ 1800.178520] __x64_sys_mount+0x282/0x300 [ 1800.179186] ? copy_mnt_ns+0xa00/0xa00 [ 1800.179823] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1800.180681] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1800.181536] do_syscall_64+0x33/0x40 [ 1800.182146] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1800.182978] RIP: 0033:0x7fa51a61504a [ 1800.183582] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1800.186572] RSP: 002b:00007fa517b88fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1800.187814] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa51a61504a [ 1800.188982] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1800.190145] RBP: 00007fa517b89040 R08: 00007fa517b89040 R09: 0000000020000040 [ 1800.191303] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1800.192462] R13: 00000000200000c0 R14: 00007fa517b89000 R15: 00000000200002c0 [ 1800.193662] CPU: 0 PID: 21312 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1800.195048] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1800.196874] Call Trace: [ 1800.197418] dump_stack+0x107/0x167 [ 1800.198146] should_fail.cold+0x5/0xa [ 1800.198903] ? create_object.isra.0+0x3a/0xa20 [ 1800.199807] should_failslab+0x5/0x20 [ 1800.200561] kmem_cache_alloc+0x5b/0x310 [ 1800.201381] create_object.isra.0+0x3a/0xa20 [ 1800.202251] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1800.203265] __kmalloc_track_caller+0x177/0x370 [ 1800.204176] ? match_number+0xaf/0x1d0 [ 1800.204840] kmemdup_nul+0x2d/0xa0 [ 1800.205445] match_number+0xaf/0x1d0 [ 1800.206084] ? match_u64+0x190/0x190 [ 1800.206699] ? trace_hardirqs_on+0x5b/0x180 [ 1800.207412] tracefs_parse_options+0x36b/0x550 [ 1800.208170] ? tracefs_show_options+0x1e0/0x1e0 [ 1800.208932] ? get_nr_dirty_inodes+0x19e/0x220 [ 1800.209700] ? __sync_blockdev+0xbe/0xf0 [ 1800.210358] ? sync_filesystem.part.0+0x191/0x1f0 [ 1800.211310] tracefs_remount+0x48/0x90 [ 1800.212041] ? tracefs_apply_options.isra.0+0x950/0x950 [ 1800.212916] legacy_reconfigure+0x11b/0x190 [ 1800.213643] reconfigure_super+0x414/0x9c0 [ 1800.214322] ? fs_umode_to_dtype+0xb0/0xb0 [ 1800.215026] path_mount+0x1ae0/0x2120 [ 1800.215670] ? strncpy_from_user+0x9e/0x470 [ 1800.216370] ? finish_automount+0xa90/0xa90 [ 1800.217138] ? getname_flags.part.0+0x1dd/0x4f0 [ 1800.217906] __x64_sys_mount+0x282/0x300 [ 1800.218565] ? copy_mnt_ns+0xa00/0xa00 [ 1800.219199] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1800.220050] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1800.220887] do_syscall_64+0x33/0x40 [ 1800.221492] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1800.222319] RIP: 0033:0x7f168587204a [ 1800.222917] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1800.225863] RSP: 002b:00007f1682de5fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1800.227085] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f168587204a [ 1800.228228] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1800.229379] RBP: 00007f1682de6040 R08: 00007f1682de6040 R09: 0000000020000040 [ 1800.230517] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1800.231658] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 [ 1800.254625] FAULT_INJECTION: forcing a failure. [ 1800.254625] name failslab, interval 1, probability 0, space 0, times 0 [ 1800.256638] CPU: 1 PID: 21396 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1800.257742] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1800.259037] Call Trace: [ 1800.259456] dump_stack+0x107/0x167 [ 1800.260041] should_fail.cold+0x5/0xa [ 1800.260651] ? copy_process+0x1c5b/0x7800 [ 1800.261332] should_failslab+0x5/0x20 [ 1800.261934] kmem_cache_alloc+0x5b/0x310 [ 1800.262571] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1800.263407] copy_process+0x1c5b/0x7800 [ 1800.264061] ? __lock_acquire+0xbb1/0x5b00 [ 1800.264782] ? __cleanup_sighand+0xb0/0xb0 [ 1800.265482] ? lock_acquire+0x197/0x470 [ 1800.266151] ? find_held_lock+0x2c/0x110 [ 1800.266796] kernel_clone+0xe7/0x980 [ 1800.267390] ? lock_downgrade+0x6d0/0x6d0 [ 1800.268016] ? find_held_lock+0x2c/0x110 [ 1800.268636] ? create_io_thread+0xf0/0xf0 [ 1800.269318] ? ksys_write+0x12d/0x260 [ 1800.269912] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1800.270656] __do_sys_fork+0x8a/0xc0 [ 1800.271226] ? kernel_thread+0xf0/0xf0 [ 1800.271836] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1800.272637] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1800.273439] ? trace_hardirqs_on+0x5b/0x180 [ 1800.274097] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1800.274893] do_syscall_64+0x33/0x40 [ 1800.275463] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1800.276296] RIP: 0033:0x7fe69fe62b19 [ 1800.276880] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1800.279791] RSP: 002b:00007fe69d3b7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1800.281022] RAX: ffffffffffffffda RBX: 00007fe69ff76020 RCX: 00007fe69fe62b19 [ 1800.282430] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1800.283600] RBP: 00007fe69d3b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 1800.284733] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1800.285889] R13: 00007ffffc31f9df R14: 00007fe69d3b7300 R15: 0000000000022000 11:37:27 executing program 7: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, &(0x7f0000000180)) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:37:27 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 14) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:37:27 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x9000000, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:37:27 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 23) 11:37:27 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xee, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:37:27 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 25) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) [ 1800.685366] FAULT_INJECTION: forcing a failure. [ 1800.685366] name failslab, interval 1, probability 0, space 0, times 0 [ 1800.687250] CPU: 0 PID: 21634 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1800.688248] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1800.689460] Call Trace: [ 1800.689841] dump_stack+0x107/0x167 [ 1800.690356] should_fail.cold+0x5/0xa [ 1800.690926] ? create_object.isra.0+0x3a/0xa20 [ 1800.691594] should_failslab+0x5/0x20 [ 1800.692166] kmem_cache_alloc+0x5b/0x310 [ 1800.692772] create_object.isra.0+0x3a/0xa20 [ 1800.693430] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1800.694368] kmem_cache_alloc+0x159/0x310 [ 1800.694984] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1800.695776] copy_process+0x1c5b/0x7800 [ 1800.696367] ? __lock_acquire+0xbb1/0x5b00 [ 1800.697013] ? __cleanup_sighand+0xb0/0xb0 [ 1800.697649] ? lock_acquire+0x197/0x470 [ 1800.698246] ? find_held_lock+0x2c/0x110 [ 1800.698843] kernel_clone+0xe7/0x980 [ 1800.699397] ? lock_downgrade+0x6d0/0x6d0 [ 1800.700006] ? find_held_lock+0x2c/0x110 [ 1800.700612] ? create_io_thread+0xf0/0xf0 [ 1800.701259] ? ksys_write+0x12d/0x260 [ 1800.701825] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1800.702533] __do_sys_fork+0x8a/0xc0 [ 1800.703093] ? kernel_thread+0xf0/0xf0 [ 1800.703674] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1800.704451] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1800.705202] ? trace_hardirqs_on+0x5b/0x180 [ 1800.705830] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1800.706582] do_syscall_64+0x33/0x40 [ 1800.707139] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1800.707876] RIP: 0033:0x7fe69fe62b19 [ 1800.708426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1800.711087] RSP: 002b:00007fe69d3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1800.712209] RAX: ffffffffffffffda RBX: 00007fe69ff75f60 RCX: 00007fe69fe62b19 [ 1800.713259] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1800.714299] RBP: 00007fe69d3d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1800.715336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1800.716364] R13: 00007ffffc31f9df R14: 00007fe69d3d8300 R15: 0000000000022000 [ 1800.719750] FAULT_INJECTION: forcing a failure. [ 1800.719750] name failslab, interval 1, probability 0, space 0, times 0 [ 1800.722028] CPU: 1 PID: 21631 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1800.723142] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1800.724462] Call Trace: [ 1800.724897] dump_stack+0x107/0x167 [ 1800.725500] should_fail.cold+0x5/0xa [ 1800.726123] ? create_object.isra.0+0x3a/0xa20 [ 1800.726863] should_failslab+0x5/0x20 [ 1800.727467] kmem_cache_alloc+0x5b/0x310 [ 1800.728123] create_object.isra.0+0x3a/0xa20 [ 1800.728831] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1800.729665] kmem_cache_alloc_trace+0x151/0x320 [ 1800.730392] ? cap_capable+0x1cd/0x230 [ 1800.731021] alloc_fs_context+0x57/0x840 [ 1800.731695] path_mount+0x962/0x2120 [ 1800.732306] ? strncpy_from_user+0x9e/0x470 [ 1800.733000] ? finish_automount+0xa90/0xa90 [ 1800.733693] ? getname_flags.part.0+0x1dd/0x4f0 [ 1800.734549] __x64_sys_mount+0x282/0x300 [ 1800.735229] ? copy_mnt_ns+0xa00/0xa00 [ 1800.735848] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1800.736684] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1800.737661] do_syscall_64+0x33/0x40 [ 1800.738425] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1800.739377] RIP: 0033:0x7fa51a61504a [ 1800.740026] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1800.742885] RSP: 002b:00007fa517b88fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1800.744065] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa51a61504a [ 1800.745168] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1800.746275] RBP: 00007fa517b89040 R08: 00007fa517b89040 R09: 0000000020000040 [ 1800.747377] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1800.748474] R13: 00000000200000c0 R14: 00007fa517b89000 R15: 00000000200002c0 [ 1800.901220] FAULT_INJECTION: forcing a failure. [ 1800.901220] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1800.903165] CPU: 0 PID: 21732 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1800.904090] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1800.905295] Call Trace: [ 1800.905660] dump_stack+0x107/0x167 [ 1800.906154] should_fail.cold+0x5/0xa [ 1800.906676] strncpy_from_user+0x34/0x470 [ 1800.907241] getname_flags.part.0+0x95/0x4f0 [ 1800.907834] getname+0x8e/0xd0 [ 1800.908266] do_sys_openat2+0xf9/0x420 [ 1800.908761] ? __kasan_slab_free+0x122/0x160 [ 1800.909363] ? build_open_flags+0x6f0/0x6f0 [ 1800.909941] ? __x64_sys_mount+0x227/0x300 [ 1800.910508] ? kfree+0xd7/0x340 [ 1800.910962] __x64_sys_openat+0x13f/0x1f0 [ 1800.911499] ? __ia32_sys_open+0x1c0/0x1c0 [ 1800.912074] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1800.912741] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1800.913444] do_syscall_64+0x33/0x40 [ 1800.913923] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1800.914606] RIP: 0033:0x7f1685823a04 [ 1800.915107] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1800.917420] RSP: 002b:00007f1682de5f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1800.918438] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1685823a04 [ 1800.919388] RDX: 0000000000010000 RSI: 00000000200000c0 RDI: 00000000ffffff9c [ 1800.920341] RBP: 00000000200000c0 R08: 0000000000000000 R09: 0000000020000040 [ 1800.921291] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1800.922226] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 11:37:40 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 26) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:37:40 executing program 3: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @initdev}, &(0x7f00000001c0)=0x1c, 0x80000) sendmsg$inet6(r0, &(0x7f0000000780)={&(0x7f0000000200)={0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x200}, 0x1c, &(0x7f0000000600)=[{&(0x7f0000000340)="a340d044763b92e5a30cce0d7b86063b661b23060650383af4041e17123236ad64c0e1e43344a520c2ddca5a190718c588f1bfa948c62ec0e8d544e4bb254ea912113ab7b07ec0fb3f3dac933cba1c20af6f25c1256760abf41e5ff6b4837aa59181efc7ffeb2e9ba72cfb049ed99a3c8bff81b6213c0028667c1fb4763eadbb34e5f2fce3cb5ccc25e2b051a2f1e0ff0be9d3079c08cb156e2617db5ddf7e", 0x9f}, {&(0x7f0000000240)="4afdd173039e5ac044ac573003f23f99e68beff5d96876e93b391deea74f2af93e2e7c40329056f26ef3f8c2cab0bc76fd6e50ac443cb8d60bc4b5cd9382f3c676c46af05bd0989b10b1d6a075984a3ab3336ec672", 0x55}, {&(0x7f0000000400)="db63a7e84f9cc0c3f8fbd26ec0da32fa5ed1ac6703d82d154085ba2959aa80d188f57539dd06d8058b92145f714bc6e7475efef5f2e8d9dcdf53af2c238df7569d5713242a52359b279ca039cb3822dd80208808aeff2e605440d20a9d68bac0c9384e8f5d05a8dc79fbf3e3612643f1e6634c32b60ac3", 0x77}, {&(0x7f0000000480)="aedcd0180ca097f566bda1ff5b9cfa5078cdc576cadfd98f423270ece8661d911e2ef240ff318ea2cf099f33f9ea875c54ffcce62996286479d88c353cbcf2be9918e90d53c8677a7e6cff6d43", 0x4d}, {&(0x7f0000000500)="7fa24659d8a7cebaaaa6d867e0c831efd9598732c9a74a4d80934a7d0630aab87d4e5fc98e8606796b04154f794c2f57ed718e8e01d49433ac62eb029a773d13889b352f255219d98842b5fe52442262fcf5a8328f6931c49c24c0219c5ca74da8fbf7a40e7325d87f97d5deb6358c2aa5c1e0d38e7d39b23bc5f9", 0x7b}, {&(0x7f0000000580)="6fa97f59c84e08c52e7d1e1fabbdc8c5dfa783ac2a04ebe266cc3351a8523fffa5ca7b64ef407589cd45be55cac320cce3804c2c1d562a6108f89682df1bcaa51b859154fc92f5d7fab1fd7f82", 0x4d}], 0x6, &(0x7f0000000680)=[@hopopts_2292={{0x58, 0x29, 0x36, {0x2f, 0x7, '\x00', [@hao={0xc9, 0x10, @rand_addr=' \x01\x00'}, @calipso={0x7, 0x28, {0x6a908adc8f03f9d2, 0x8, 0xff, 0x3, [0x1, 0xc9ae, 0x0, 0x9]}}]}}}, @rthdr={{0x58, 0x29, 0x39, {0x33, 0x8, 0x1, 0x5, 0x0, [@mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty, @mcast1]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7f}}], 0xc8}, 0x20000000) r1 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000a96000/0x3000)=nil, 0x3000, 0x2, 0x30, r3, 0xd1079000) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) r6 = openat$incfs(0xffffffffffffffff, &(0x7f0000000880)='.log\x00', 0x121203, 0x80) r7 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0x16, 0x61, 0xa0, 0x8, 0x0, 0x80, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_bp={&(0x7f00000007c0), 0x1}, 0x2, 0x7, 0x5, 0x86f5d6b1f334fda1, 0x8000, 0x3, 0x86dc, 0x0, 0x3, 0x0, 0x6}, 0x0, 0xd, r6, 0x8) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, 0xffffffffffffffff) fork() ioctl$F2FS_IOC_MOVE_RANGE(r7, 0xc020f509, &(0x7f00000008c0)={r1, 0x7, 0x7, 0x4}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r6, 0xc0189374, &(0x7f0000000900)={{0x1, 0x1, 0x18, r6, {0x9}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r8, 0xc0189376, &(0x7f0000000940)={{0x1, 0x1, 0x18, r9, {0x3}}, './file0\x00'}) 11:37:40 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 24) 11:37:40 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x500, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:37:40 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x10000000, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:37:40 executing program 1: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000411000/0x3000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:37:40 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 15) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) [ 1813.557313] FAULT_INJECTION: forcing a failure. [ 1813.557313] name failslab, interval 1, probability 0, space 0, times 0 [ 1813.559509] CPU: 0 PID: 21860 Comm: syz-executor.2 Not tainted 5.10.209 #1 11:37:40 executing program 7: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f00000012c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_QOS_MAP(r7, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000001300)={0x1c, r8, 0x1, 0x0, 0x0, {{0x75}, {@val={0x8, 0x3, r6}, @void}}}, 0x1c}}, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = socket$inet(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r9, 0x890b, &(0x7f0000000140)={@private0, @loopback, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400032, r11}) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r7, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)={0x84, 0x0, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x20, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}]}, @MPTCP_PM_ATTR_ADDR={0x48, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @local}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r11}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}]}, 0x84}, 0x1, 0x0, 0x0, 0x8004}, 0x4004004) fork() [ 1813.560704] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1813.562238] Call Trace: [ 1813.562690] dump_stack+0x107/0x167 [ 1813.563301] should_fail.cold+0x5/0xa [ 1813.563946] ? copy_process+0x24f5/0x7800 [ 1813.564659] should_failslab+0x5/0x20 [ 1813.565294] kmem_cache_alloc+0x5b/0x310 [ 1813.565984] copy_process+0x24f5/0x7800 [ 1813.566668] ? __lock_acquire+0xbb1/0x5b00 [ 1813.567439] ? __cleanup_sighand+0xb0/0xb0 [ 1813.568145] ? lock_acquire+0x197/0x470 [ 1813.568829] ? find_held_lock+0x2c/0x110 [ 1813.569534] kernel_clone+0xe7/0x980 [ 1813.570167] ? lock_downgrade+0x6d0/0x6d0 [ 1813.570898] ? find_held_lock+0x2c/0x110 [ 1813.571591] ? create_io_thread+0xf0/0xf0 [ 1813.572291] ? ksys_write+0x12d/0x260 [ 1813.572953] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1813.573792] __do_sys_fork+0x8a/0xc0 [ 1813.574426] ? kernel_thread+0xf0/0xf0 [ 1813.575100] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1813.575976] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1813.576838] ? trace_hardirqs_on+0x5b/0x180 [ 1813.577558] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1813.578349] FAULT_INJECTION: forcing a failure. [ 1813.578349] name failslab, interval 1, probability 0, space 0, times 0 [ 1813.578450] do_syscall_64+0x33/0x40 [ 1813.580155] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1813.581038] RIP: 0033:0x7fe69fe62b19 [ 1813.581694] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1813.584861] RSP: 002b:00007fe69d3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1813.586202] RAX: ffffffffffffffda RBX: 00007fe69ff75f60 RCX: 00007fe69fe62b19 [ 1813.587406] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1813.588624] RBP: 00007fe69d3d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1813.589834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1813.591037] R13: 00007ffffc31f9df R14: 00007fe69d3d8300 R15: 0000000000022000 [ 1813.592264] CPU: 1 PID: 21851 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1813.593033] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1813.593892] Call Trace: [ 1813.594178] dump_stack+0x107/0x167 [ 1813.594554] should_fail.cold+0x5/0xa [ 1813.594948] ? __alloc_file+0x21/0x320 [ 1813.595394] should_failslab+0x5/0x20 [ 1813.595785] kmem_cache_alloc+0x5b/0x310 [ 1813.596203] __alloc_file+0x21/0x320 [ 1813.596584] alloc_empty_file+0x6d/0x170 [ 1813.597005] path_openat+0xe3/0x26e0 [ 1813.597398] ? path_lookupat+0x860/0x860 [ 1813.597819] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1813.598351] ? lock_acquire+0x197/0x470 [ 1813.598765] do_filp_open+0x190/0x3e0 [ 1813.599167] ? may_open_dev+0xf0/0xf0 [ 1813.599569] ? __alloc_fd+0x2b8/0x630 [ 1813.599962] ? lock_downgrade+0x6d0/0x6d0 [ 1813.600387] ? do_raw_spin_lock+0x121/0x260 [ 1813.600968] ? rwlock_bug.part.0+0x90/0x90 [ 1813.601417] ? _raw_spin_unlock+0x1a/0x30 [ 1813.601839] ? __alloc_fd+0x2b8/0x630 [ 1813.602234] do_sys_openat2+0x171/0x420 [ 1813.602642] ? __kasan_slab_free+0x122/0x160 [ 1813.603095] ? build_open_flags+0x6f0/0x6f0 [ 1813.603535] ? __x64_sys_mount+0x227/0x300 [ 1813.603964] ? kfree+0xd7/0x340 [ 1813.604306] __x64_sys_openat+0x13f/0x1f0 [ 1813.604726] ? __ia32_sys_open+0x1c0/0x1c0 [ 1813.605163] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1813.605682] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1813.606158] do_syscall_64+0x33/0x40 [ 1813.606519] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1813.606983] RIP: 0033:0x7f1685823a04 [ 1813.607344] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1813.609134] RSP: 002b:00007f1682de5f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1813.609911] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1685823a04 [ 1813.610760] RDX: 0000000000010000 RSI: 00000000200000c0 RDI: 00000000ffffff9c [ 1813.611446] RBP: 00000000200000c0 R08: 0000000000000000 R09: 0000000020000040 [ 1813.612149] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1813.612842] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 [ 1813.657767] FAULT_INJECTION: forcing a failure. [ 1813.657767] name failslab, interval 1, probability 0, space 0, times 0 [ 1813.659304] CPU: 1 PID: 21864 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1813.660000] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1813.660843] Call Trace: [ 1813.661125] dump_stack+0x107/0x167 [ 1813.661523] should_fail.cold+0x5/0xa [ 1813.661920] ? legacy_init_fs_context+0x44/0xe0 [ 1813.662404] should_failslab+0x5/0x20 [ 1813.662800] kmem_cache_alloc_trace+0x55/0x320 [ 1813.663254] ? lockdep_init_map_type+0x2c7/0x780 [ 1813.663724] legacy_init_fs_context+0x44/0xe0 [ 1813.664166] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1813.664656] alloc_fs_context+0x4fd/0x840 [ 1813.665072] path_mount+0x962/0x2120 [ 1813.665459] ? strncpy_from_user+0x9e/0x470 [ 1813.665814] ? finish_automount+0xa90/0xa90 [ 1813.666249] ? getname_flags.part.0+0x1dd/0x4f0 [ 1813.666712] __x64_sys_mount+0x282/0x300 [ 1813.667119] ? copy_mnt_ns+0xa00/0xa00 [ 1813.667513] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1813.668029] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1813.668544] do_syscall_64+0x33/0x40 [ 1813.668918] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1813.669433] RIP: 0033:0x7fa51a61504a [ 1813.669813] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1813.671453] RSP: 002b:00007fa517b88fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1813.672408] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa51a61504a [ 1813.673195] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1813.673789] RBP: 00007fa517b89040 R08: 00007fa517b89040 R09: 0000000020000040 [ 1813.674497] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1813.675069] R13: 00000000200000c0 R14: 00007fa517b89000 R15: 00000000200002c0 11:37:40 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x900, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:37:40 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) r6 = fork() r7 = syz_open_procfs(0x0, &(0x7f0000000180)='environ\x00') readv(r7, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3f, 0x8, 0x5, 0x4, 0x0, 0xffffffff80000001, 0x18246, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x3d7, 0x8001}, 0x10084, 0x5, 0xfffffff7, 0x4, 0x9, 0x6, 0x7fff, 0x0, 0x1}, r6, 0x1, r7, 0x2) 11:37:40 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 25) [ 1813.877597] FAULT_INJECTION: forcing a failure. [ 1813.877597] name failslab, interval 1, probability 0, space 0, times 0 [ 1813.879543] CPU: 0 PID: 22177 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1813.880640] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1813.881886] Call Trace: [ 1813.882287] dump_stack+0x107/0x167 [ 1813.882846] should_fail.cold+0x5/0xa [ 1813.883431] ? create_object.isra.0+0x3a/0xa20 [ 1813.884124] should_failslab+0x5/0x20 [ 1813.884703] kmem_cache_alloc+0x5b/0x310 [ 1813.885328] create_object.isra.0+0x3a/0xa20 [ 1813.885981] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1813.886737] kmem_cache_alloc+0x159/0x310 [ 1813.887364] copy_process+0x24f5/0x7800 [ 1813.887955] ? __lock_acquire+0xbb1/0x5b00 [ 1813.888598] ? __cleanup_sighand+0xb0/0xb0 [ 1813.889229] ? lock_acquire+0x197/0x470 [ 1813.889836] ? find_held_lock+0x2c/0x110 [ 1813.890446] kernel_clone+0xe7/0x980 [ 1813.891002] ? lock_downgrade+0x6d0/0x6d0 [ 1813.891615] ? find_held_lock+0x2c/0x110 [ 1813.892219] ? create_io_thread+0xf0/0xf0 [ 1813.892843] ? ksys_write+0x12d/0x260 [ 1813.893426] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1813.894158] __do_sys_fork+0x8a/0xc0 [ 1813.894717] ? kernel_thread+0xf0/0xf0 [ 1813.895308] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1813.896089] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1813.896864] ? trace_hardirqs_on+0x5b/0x180 [ 1813.897520] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1813.898256] do_syscall_64+0x33/0x40 [ 1813.898779] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1813.899514] RIP: 0033:0x7fe69fe62b19 [ 1813.900038] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1813.902712] RSP: 002b:00007fe69d3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1813.903799] RAX: ffffffffffffffda RBX: 00007fe69ff75f60 RCX: 00007fe69fe62b19 [ 1813.904818] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1813.905841] RBP: 00007fe69d3d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1813.906868] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1813.907867] R13: 00007ffffc31f9df R14: 00007fe69d3d8300 R15: 0000000000022000 11:37:40 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x18000000, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:37:40 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 27) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:37:40 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 16) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) [ 1814.059663] FAULT_INJECTION: forcing a failure. [ 1814.059663] name failslab, interval 1, probability 0, space 0, times 0 [ 1814.061634] CPU: 0 PID: 22227 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1814.062646] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1814.063860] Call Trace: [ 1814.064256] dump_stack+0x107/0x167 [ 1814.064799] should_fail.cold+0x5/0xa [ 1814.065374] ? create_object.isra.0+0x3a/0xa20 [ 1814.066050] should_failslab+0x5/0x20 [ 1814.066612] kmem_cache_alloc+0x5b/0x310 [ 1814.067220] create_object.isra.0+0x3a/0xa20 [ 1814.067869] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1814.068620] kmem_cache_alloc_trace+0x151/0x320 [ 1814.069317] ? lockdep_init_map_type+0x2c7/0x780 [ 1814.070024] legacy_init_fs_context+0x44/0xe0 [ 1814.070677] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1814.071413] alloc_fs_context+0x4fd/0x840 [ 1814.072032] path_mount+0x962/0x2120 [ 1814.072588] ? strncpy_from_user+0x9e/0x470 [ 1814.073219] ? finish_automount+0xa90/0xa90 [ 1814.073865] ? getname_flags.part.0+0x1dd/0x4f0 [ 1814.074555] __x64_sys_mount+0x282/0x300 [ 1814.075154] ? copy_mnt_ns+0xa00/0xa00 [ 1814.075730] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1814.076495] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1814.077236] do_syscall_64+0x33/0x40 [ 1814.077789] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1814.078533] RIP: 0033:0x7fa51a61504a [ 1814.079076] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1814.081737] RSP: 002b:00007fa517b88fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1814.082845] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa51a61504a [ 1814.083880] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1814.084910] RBP: 00007fa517b89040 R08: 00007fa517b89040 R09: 0000000020000040 [ 1814.085954] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1814.086992] R13: 00000000200000c0 R14: 00007fa517b89000 R15: 00000000200002c0 [ 1814.129254] FAULT_INJECTION: forcing a failure. [ 1814.129254] name failslab, interval 1, probability 0, space 0, times 0 [ 1814.130470] CPU: 1 PID: 22284 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1814.131019] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1814.131677] Call Trace: [ 1814.131898] dump_stack+0x107/0x167 [ 1814.132194] should_fail.cold+0x5/0xa [ 1814.132502] ? create_object.isra.0+0x3a/0xa20 [ 1814.132867] should_failslab+0x5/0x20 [ 1814.133172] kmem_cache_alloc+0x5b/0x310 [ 1814.133509] create_object.isra.0+0x3a/0xa20 [ 1814.133984] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1814.134406] kmem_cache_alloc+0x159/0x310 [ 1814.134844] __alloc_file+0x21/0x320 [ 1814.135214] alloc_empty_file+0x6d/0x170 [ 1814.135583] path_openat+0xe3/0x26e0 [ 1814.135888] ? path_lookupat+0x860/0x860 [ 1814.136217] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1814.136633] ? lock_acquire+0x197/0x470 [ 1814.136957] do_filp_open+0x190/0x3e0 [ 1814.137256] ? may_open_dev+0xf0/0xf0 [ 1814.137573] ? __alloc_fd+0x2b8/0x630 [ 1814.137879] ? lock_downgrade+0x6d0/0x6d0 [ 1814.138209] ? do_raw_spin_lock+0x121/0x260 [ 1814.138552] ? rwlock_bug.part.0+0x90/0x90 [ 1814.138894] ? _raw_spin_unlock+0x1a/0x30 [ 1814.139226] ? __alloc_fd+0x2b8/0x630 [ 1814.139533] do_sys_openat2+0x171/0x420 [ 1814.139967] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1814.140516] ? build_open_flags+0x6f0/0x6f0 [ 1814.140863] ? __x64_sys_openat+0x183/0x1f0 [ 1814.141212] __x64_sys_openat+0x13f/0x1f0 [ 1814.141550] ? __ia32_sys_open+0x1c0/0x1c0 [ 1814.141897] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1814.142308] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1814.142717] do_syscall_64+0x33/0x40 [ 1814.143015] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1814.143420] RIP: 0033:0x7f1685823a04 [ 1814.143716] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1814.145512] RSP: 002b:00007f1682de5f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1814.146216] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1685823a04 [ 1814.146770] RDX: 0000000000010000 RSI: 00000000200000c0 RDI: 00000000ffffff9c [ 1814.147329] RBP: 00000000200000c0 R08: 0000000000000000 R09: 0000000020000040 [ 1814.147894] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1814.148510] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 [ 1824.053076] kworker/dying (10076) used greatest stack depth: 23456 bytes left 11:37:56 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 28) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:37:56 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 17) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:37:56 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0xfffffff8, 0x0, 0x1, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000180)) 11:37:56 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x40000000, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:37:56 executing program 3: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x32ad}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000e1b000/0x1000)=nil, 0x0, &(0x7f0000000380)) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, r1, 0x80, &(0x7f0000000240)=@l2tp={0x2, 0x0, @broadcast, 0x4}, 0x0, 0x0, 0x1}, 0x34) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/snd_intel_dspcfg', 0xd8840, 0x63) r3 = syz_io_uring_setup(0x37f0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000dad000/0x3000)=nil, &(0x7f0000000300)=0x0, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x18, 0x0, 0x0, {0x0, r5}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x4401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) setsockopt(r7, 0x4aa, 0xf1, &(0x7f0000001480)="99c1b5d33c7325a292019125fb6468a66f8f3dec42014782f500ca982008023243be85bf6206d66a967ea992e0cb1a2588e4fdcb8fca307d3a7478bb909bbe71fbb9779dc769a64c88be93293dea8d172975b30f42d1637ad50efe", 0x5b) r8 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r8, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, 0xffffffffffffffff) fork() 11:37:56 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 26) 11:37:56 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x1800, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:37:56 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f00000001c0)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x5, 0x2004, @fd_index=0x9, 0x9, 0x0, 0x0, 0x19, 0x1, {0x1, r2}}, 0x3) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000002, 0x10110, r0, 0x8000000) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r5, r6, &(0x7f00000018c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r7, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0, 0x4c561903a7c10053}, 0x0) syz_io_uring_submit(r4, r6, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd=r0, 0x3, 0x0, 0x7ff, 0x1}, 0x6) r8 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r8, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) preadv(r7, &(0x7f0000000400)=[{&(0x7f0000000500)=""/245, 0xf5}, {&(0x7f0000000600)=""/254, 0xfe}, {&(0x7f0000000700)=""/220, 0xdc}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f00000001c0)}, {&(0x7f0000000800)=""/181, 0xb5}, {&(0x7f0000000900)=""/161, 0xa1}], 0x7, 0x7, 0x0) syz_io_uring_submit(r9, r10, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() [ 1829.629999] FAULT_INJECTION: forcing a failure. [ 1829.629999] name failslab, interval 1, probability 0, space 0, times 0 [ 1829.632137] CPU: 0 PID: 22497 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1829.633079] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1829.634432] Call Trace: [ 1829.634823] dump_stack+0x107/0x167 [ 1829.635394] should_fail.cold+0x5/0xa [ 1829.635983] ? __alloc_file+0x21/0x320 [ 1829.636533] ? __alloc_file+0x21/0x320 [ 1829.637139] should_failslab+0x5/0x20 [ 1829.637713] kmem_cache_alloc+0x5b/0x310 [ 1829.638318] __alloc_file+0x21/0x320 [ 1829.638955] alloc_empty_file+0x6d/0x170 [ 1829.639527] path_openat+0xe3/0x26e0 [ 1829.640181] ? path_lookupat+0x860/0x860 [ 1829.640756] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1829.641659] ? lock_acquire+0x197/0x470 [ 1829.642344] do_filp_open+0x190/0x3e0 [ 1829.642986] ? may_open_dev+0xf0/0xf0 [ 1829.643637] ? __alloc_fd+0x2b8/0x630 [ 1829.644281] ? lock_downgrade+0x6d0/0x6d0 [ 1829.644992] ? do_raw_spin_lock+0x121/0x260 [ 1829.645734] ? rwlock_bug.part.0+0x90/0x90 [ 1829.646454] ? _raw_spin_unlock+0x1a/0x30 [ 1829.647165] ? __alloc_fd+0x2b8/0x630 [ 1829.647813] do_sys_openat2+0x171/0x420 [ 1829.648491] ? finish_task_switch+0x126/0x5d0 [ 1829.649245] ? finish_task_switch+0xef/0x5d0 [ 1829.649990] ? build_open_flags+0x6f0/0x6f0 [ 1829.650711] ? __schedule+0x82c/0x1ea0 [ 1829.651392] __x64_sys_openat+0x13f/0x1f0 [ 1829.651963] ? __ia32_sys_open+0x1c0/0x1c0 [ 1829.652667] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1829.653549] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1829.654417] do_syscall_64+0x33/0x40 [ 1829.655043] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1829.655886] RIP: 0033:0x7f1685823a04 [ 1829.656510] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1829.659584] RSP: 002b:00007f1682de5f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1829.660851] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1685823a04 [ 1829.662050] RDX: 0000000000010000 RSI: 00000000200000c0 RDI: 00000000ffffff9c [ 1829.663232] RBP: 00000000200000c0 R08: 0000000000000000 R09: 0000000020000040 [ 1829.664415] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1829.665607] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 [ 1829.703583] FAULT_INJECTION: forcing a failure. [ 1829.703583] name failslab, interval 1, probability 0, space 0, times 0 [ 1829.705738] CPU: 1 PID: 22499 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1829.706807] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1829.708084] Call Trace: [ 1829.708501] dump_stack+0x107/0x167 [ 1829.709073] should_fail.cold+0x5/0xa [ 1829.709690] should_failslab+0x5/0x20 [ 1829.710289] __kmalloc_track_caller+0x79/0x370 [ 1829.710986] ? match_number+0xaf/0x1d0 [ 1829.711617] kmemdup_nul+0x2d/0xa0 [ 1829.712170] match_number+0xaf/0x1d0 [ 1829.712755] ? match_u64+0x190/0x190 [ 1829.713381] ? list_lru_walk_node+0x209/0x2b0 [ 1829.714082] ? lock_downgrade+0x6d0/0x6d0 [ 1829.714783] tracefs_parse_options+0x36b/0x550 [ 1829.715560] ? tracefs_show_options+0x1e0/0x1e0 [ 1829.716332] ? get_nr_dirty_inodes+0x19e/0x220 [ 1829.717079] ? __sync_blockdev+0xbe/0xf0 [ 1829.717783] ? sync_filesystem.part.0+0x191/0x1f0 [ 1829.718592] tracefs_remount+0x48/0x90 [ 1829.719249] ? tracefs_apply_options.isra.0+0x950/0x950 [ 1829.720128] legacy_reconfigure+0x11b/0x190 [ 1829.720847] reconfigure_super+0x414/0x9c0 [ 1829.721570] ? fs_umode_to_dtype+0xb0/0xb0 [ 1829.722286] path_mount+0x1ae0/0x2120 [ 1829.722911] ? strncpy_from_user+0x9e/0x470 [ 1829.723634] ? finish_automount+0xa90/0xa90 [ 1829.724352] ? getname_flags.part.0+0x1dd/0x4f0 [ 1829.725111] __x64_sys_mount+0x282/0x300 [ 1829.725804] ? copy_mnt_ns+0xa00/0xa00 [ 1829.726455] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1829.727325] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1829.728170] do_syscall_64+0x33/0x40 [ 1829.728790] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1829.729653] RIP: 0033:0x7fa51a61504a [ 1829.730278] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1829.733336] RSP: 002b:00007fa517b88fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1829.734780] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa51a61504a [ 1829.736126] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1829.737230] RBP: 00007fa517b89040 R08: 00007fa517b89040 R09: 0000000020000040 [ 1829.738332] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1829.739393] R13: 00000000200000c0 R14: 00007fa517b89000 R15: 00000000200002c0 [ 1829.848486] FAULT_INJECTION: forcing a failure. [ 1829.848486] name failslab, interval 1, probability 0, space 0, times 0 [ 1829.850419] CPU: 0 PID: 22566 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1829.851446] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1829.852662] Call Trace: [ 1829.853061] dump_stack+0x107/0x167 [ 1829.853611] should_fail.cold+0x5/0xa [ 1829.854173] ? create_object.isra.0+0x3a/0xa20 [ 1829.854851] should_failslab+0x5/0x20 [ 1829.855409] kmem_cache_alloc+0x5b/0x310 [ 1829.856012] create_object.isra.0+0x3a/0xa20 [ 1829.856665] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1829.857393] kmem_cache_alloc+0x159/0x310 [ 1829.858022] copy_process+0x1add/0x7800 [ 1829.858592] ? __lock_acquire+0xbb1/0x5b00 [ 1829.859233] ? __cleanup_sighand+0xb0/0xb0 [ 1829.859847] ? lock_acquire+0x197/0x470 [ 1829.860442] ? find_held_lock+0x2c/0x110 [ 1829.861024] kernel_clone+0xe7/0x980 [ 1829.861585] ? lock_downgrade+0x6d0/0x6d0 [ 1829.862174] ? find_held_lock+0x2c/0x110 [ 1829.862769] ? create_io_thread+0xf0/0xf0 [ 1829.863365] ? ksys_write+0x12d/0x260 [ 1829.863939] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1829.864638] __do_sys_fork+0x8a/0xc0 [ 1829.865185] ? kernel_thread+0xf0/0xf0 [ 1829.865768] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1829.866534] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1829.867264] ? trace_hardirqs_on+0x5b/0x180 [ 1829.867897] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1829.868635] do_syscall_64+0x33/0x40 [ 1829.869180] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1829.869912] RIP: 0033:0x7fe69fe62b19 [ 1829.870465] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1829.873049] RSP: 002b:00007fe69d3b7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1829.874240] RAX: ffffffffffffffda RBX: 00007fe69ff76020 RCX: 00007fe69fe62b19 [ 1829.875259] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1829.876276] RBP: 00007fe69d3b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 1829.877306] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1829.878341] R13: 00007ffffc31f9df R14: 00007fe69d3b7300 R15: 0000000000022000 11:37:57 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x4000, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:37:57 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x7ffffffe, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:37:57 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 18) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:37:57 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 29) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:37:57 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x3, 0x8}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000b58000/0x2000)=nil, 0x2000, 0x0, 0x2010, r0, 0x0) syz_io_uring_complete(r5) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) r7 = syz_open_procfs(0x0, &(0x7f0000000180)='environ\x00') readv(r7, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) io_uring_enter(r0, 0x679e, 0x18f6, 0x1, &(0x7f00000001c0)={[0x7]}, 0x8) mmap$IORING_OFF_CQ_RING(&(0x7f0000683000/0x3000)=nil, 0x3000, 0x2000001, 0x2010, r7, 0x8000000) fork() 11:37:57 executing program 7: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) r3 = syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() ioctl$AUTOFS_IOC_PROTOSUBVER(r3, 0x80049367, &(0x7f0000000180)) [ 1830.316224] FAULT_INJECTION: forcing a failure. [ 1830.316224] name failslab, interval 1, probability 0, space 0, times 0 [ 1830.318593] CPU: 1 PID: 22925 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1830.319834] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1830.321311] Call Trace: [ 1830.321795] dump_stack+0x107/0x167 [ 1830.322461] should_fail.cold+0x5/0xa [ 1830.323126] ? create_object.isra.0+0x3a/0xa20 [ 1830.324166] should_failslab+0x5/0x20 [ 1830.324846] kmem_cache_alloc+0x5b/0x310 [ 1830.325611] create_object.isra.0+0x3a/0xa20 [ 1830.326403] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1830.327346] __kmalloc_track_caller+0x177/0x370 [ 1830.328215] ? match_number+0xaf/0x1d0 [ 1830.328921] kmemdup_nul+0x2d/0xa0 [ 1830.329584] match_number+0xaf/0x1d0 [ 1830.330249] ? match_u64+0x190/0x190 [ 1830.330896] ? list_lru_walk_node+0x209/0x2b0 [ 1830.331682] ? lock_downgrade+0x6d0/0x6d0 [ 1830.332420] tracefs_parse_options+0x36b/0x550 [ 1830.333235] ? tracefs_show_options+0x1e0/0x1e0 [ 1830.334075] ? get_nr_dirty_inodes+0x19e/0x220 [ 1830.334887] ? __sync_blockdev+0xbe/0xf0 [ 1830.335609] ? sync_filesystem.part.0+0x191/0x1f0 [ 1830.336462] tracefs_remount+0x48/0x90 [ 1830.337138] ? tracefs_apply_options.isra.0+0x950/0x950 [ 1830.338107] legacy_reconfigure+0x11b/0x190 [ 1830.338995] reconfigure_super+0x414/0x9c0 [ 1830.339740] ? fs_umode_to_dtype+0xb0/0xb0 [ 1830.340492] path_mount+0x1ae0/0x2120 [ 1830.341166] ? strncpy_from_user+0x9e/0x470 [ 1830.341945] ? finish_automount+0xa90/0xa90 [ 1830.342700] ? getname_flags.part.0+0x1dd/0x4f0 [ 1830.343519] __x64_sys_mount+0x282/0x300 [ 1830.344229] ? copy_mnt_ns+0xa00/0xa00 [ 1830.344906] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1830.345845] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1830.346756] do_syscall_64+0x33/0x40 [ 1830.347411] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1830.348299] RIP: 0033:0x7fa51a61504a [ 1830.348944] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1830.352115] RSP: 002b:00007fa517b88fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1830.353320] FAULT_INJECTION: forcing a failure. [ 1830.353320] name failslab, interval 1, probability 0, space 0, times 0 [ 1830.353464] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa51a61504a [ 1830.353486] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1830.357635] RBP: 00007fa517b89040 R08: 00007fa517b89040 R09: 0000000020000040 [ 1830.358877] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1830.360107] R13: 00000000200000c0 R14: 00007fa517b89000 R15: 00000000200002c0 [ 1830.361369] CPU: 0 PID: 22924 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1830.362464] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1830.363743] Call Trace: [ 1830.364156] dump_stack+0x107/0x167 [ 1830.364728] should_fail.cold+0x5/0xa [ 1830.365325] ? create_object.isra.0+0x3a/0xa20 [ 1830.366044] should_failslab+0x5/0x20 [ 1830.366761] kmem_cache_alloc+0x5b/0x310 [ 1830.367383] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1830.368222] create_object.isra.0+0x3a/0xa20 [ 1830.368894] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1830.369686] kmem_cache_alloc+0x159/0x310 [ 1830.370332] security_file_alloc+0x34/0x170 [ 1830.370995] __alloc_file+0xb7/0x320 [ 1830.371567] alloc_empty_file+0x6d/0x170 [ 1830.372189] path_openat+0xe3/0x26e0 [ 1830.372772] ? path_lookupat+0x860/0x860 [ 1830.373402] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1830.374204] ? lock_acquire+0x197/0x470 [ 1830.374820] do_filp_open+0x190/0x3e0 [ 1830.375397] ? may_open_dev+0xf0/0xf0 [ 1830.375987] ? __alloc_fd+0x2b8/0x630 [ 1830.376573] ? lock_downgrade+0x6d0/0x6d0 [ 1830.377206] ? do_raw_spin_lock+0x121/0x260 [ 1830.377879] ? rwlock_bug.part.0+0x90/0x90 [ 1830.378541] ? _raw_spin_unlock+0x1a/0x30 [ 1830.379176] ? __alloc_fd+0x2b8/0x630 [ 1830.379767] do_sys_openat2+0x171/0x420 [ 1830.380379] ? __kasan_slab_free+0x122/0x160 [ 1830.381051] ? build_open_flags+0x6f0/0x6f0 [ 1830.381728] ? __x64_sys_mount+0x227/0x300 [ 1830.382375] ? kfree+0xd7/0x340 [ 1830.382888] __x64_sys_openat+0x13f/0x1f0 [ 1830.383523] ? __ia32_sys_open+0x1c0/0x1c0 [ 1830.384177] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1830.384979] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1830.385788] do_syscall_64+0x33/0x40 [ 1830.386362] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1830.387142] RIP: 0033:0x7f1685823a04 [ 1830.387710] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1830.390512] RSP: 002b:00007f1682de5f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1830.391671] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1685823a04 [ 1830.392757] RDX: 0000000000010000 RSI: 00000000200000c0 RDI: 00000000ffffff9c [ 1830.393855] RBP: 00000000200000c0 R08: 0000000000000000 R09: 0000000020000040 [ 1830.394933] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1830.396024] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 11:37:57 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xee00, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:38:13 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 27) 11:38:13 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 30) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:38:13 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:38:13 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 19) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:38:13 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x80000, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:38:13 executing program 3: ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000240)={0x3, 0x1}) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xffffdffd}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r3, r4, &(0x7f00000018c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r5, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0, 0x4c561903a7c10053}, 0x0) r6 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000000300)=0x0, 0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) syz_io_uring_submit(r7, 0x0, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x18, 0x0, 0x0, {0x0, r8}}, 0x0) syz_io_uring_submit(0x0, r4, &(0x7f0000000180)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, {0x0, r8}}, 0x6) r9 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r9, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) fork() 11:38:13 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r6, r7, &(0x7f00000018c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r8, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0, 0x4c561903a7c10053}, 0x0) syz_io_uring_submit(r3, r7, &(0x7f0000000680)=@IORING_OP_WRITEV={0x2, 0x0, 0x4004, @fd_index, 0x3, &(0x7f0000000600)=[{&(0x7f0000000280)="b6b62e55b26c52e7d1177f9279a956958aed8af533efb75cfabd9460", 0x1c}, {&(0x7f0000000340)="e36f0762d602ed58336ff3f4746ae76c5f968c2efa44906ca9662adfb96f65feff2b743547a8215eea59fe0fdef0a4761bbeb339d501f2d1d152c8adaa4fecb2e5baad1d46cd9d936a94f5c8692c156a0bd826924819e5379ea0656674e29f0f94f3a355347372e704579818c71b97e33971be2ba485b6349fbab3fa1667fd65858c75d993956996a3061a40e5246e8cf5564470ddb0c6a37c46919c63", 0x9d}, {&(0x7f0000000400)="b28f4e33afb0749221653366f6cb86f39f703a0c266b17b7f7e57bb96f9ff57a2d759121ee78da7e3296a0f0e7244020c94606de4d3facfe43982ae708f537110ec9908e64a3d945303b084462b907c24e009284fa27610dc28a2b78f0fee7ff0fa2f5c6d40b3464a5b47d8971fc943adb", 0x71}, {&(0x7f0000000480)="43e3a30e94f23a64fbe2ee34ba284fa76c7e81b361fd9f8a1546b5cf3af4397854947ea96fd2b5280d0ef5657ffef9e52173173bae9dccfb9e2b9a8f4ce4e7815cea57ca27ca163cc7257772ab314ce56454f9d307891df63a3b0ae5f503692119baa353738a7002382cae5427e2b9f891b5f77c6a659039a9e7a7fc6ff3cc96bab0bc4cd8fd7da9be5f7ecb1cd70d1633c681131e9dd3732a228f6a78786117106cfc629a1096a0310d2e66834c1aec65a55b6bb2880dc8984e42c4404bd1703cbbf9e6e6e9116905823c04f1ea", 0xce}, {&(0x7f0000000580)="76b97f9f8d3d9860ee851cfe76403e896787626d394794ae5d6f1b12f1605741e7ad29d2aa27fb4878ed7f6323f029c54a0555dd49f723c043e66156a2c9f182ed65de4bc9b08e6a051f0baf0c", 0x4d}], 0x5, 0x0, 0x0, {0x2}}, 0x7) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2, {0xffffffff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000200)={0x5, 0x80, 0x0, 0x9, 0x8, 0x5, 0x0, 0x4, 0xb040, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1fb7c000, 0x4, @perf_bp={&(0x7f00000001c0), 0x3}, 0x4041e, 0x8, 0x95c, 0x0, 0x8c, 0x388035d3, 0x7, 0x0, 0x3, 0x0, 0x100}) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, 0xffffffffffffffff) r10 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r10, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:38:13 executing program 7: syz_io_uring_setup(0x4d42, &(0x7f00000002c0)={0x0, 0x0, 0x2, 0x8000004}, &(0x7f00000a0000)=nil, &(0x7f00001a8000/0x4000)=nil, 0x0, &(0x7f00000001c0)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() [ 1846.348706] FAULT_INJECTION: forcing a failure. [ 1846.348706] name failslab, interval 1, probability 0, space 0, times 0 [ 1846.350293] CPU: 1 PID: 23253 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1846.351053] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1846.352099] Call Trace: [ 1846.352403] dump_stack+0x107/0x167 [ 1846.352885] should_fail.cold+0x5/0xa [ 1846.353321] should_failslab+0x5/0x20 [ 1846.353828] __kmalloc_track_caller+0x79/0x370 [ 1846.354283] ? match_number+0xaf/0x1d0 [ 1846.354797] kmemdup_nul+0x2d/0xa0 [ 1846.355193] match_number+0xaf/0x1d0 [ 1846.355682] ? match_u64+0x190/0x190 [ 1846.356057] ? list_lru_walk_node+0x209/0x2b0 [ 1846.356635] ? lock_downgrade+0x6d0/0x6d0 [ 1846.357097] tracefs_parse_options+0x36b/0x550 [ 1846.357704] ? tracefs_show_options+0x1e0/0x1e0 [ 1846.358204] ? get_nr_dirty_inodes+0x19e/0x220 [ 1846.358802] ? __sync_blockdev+0xbe/0xf0 [ 1846.359253] ? sync_filesystem.part.0+0x191/0x1f0 [ 1846.359877] tracefs_remount+0x48/0x90 [ 1846.360316] ? tracefs_apply_options.isra.0+0x950/0x950 [ 1846.360860] FAULT_INJECTION: forcing a failure. [ 1846.360860] name failslab, interval 1, probability 0, space 0, times 0 [ 1846.362289] legacy_reconfigure+0x11b/0x190 [ 1846.362307] reconfigure_super+0x414/0x9c0 [ 1846.362323] ? fs_umode_to_dtype+0xb0/0xb0 [ 1846.362342] path_mount+0x1ae0/0x2120 [ 1846.362361] ? strncpy_from_user+0x9e/0x470 [ 1846.362377] ? finish_automount+0xa90/0xa90 [ 1846.362391] ? getname_flags.part.0+0x1dd/0x4f0 [ 1846.362412] __x64_sys_mount+0x282/0x300 [ 1846.362427] ? copy_mnt_ns+0xa00/0xa00 [ 1846.362444] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1846.362458] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1846.362477] do_syscall_64+0x33/0x40 [ 1846.362490] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1846.362499] RIP: 0033:0x7fa51a61504a [ 1846.362512] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1846.362519] RSP: 002b:00007fa517b88fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1846.362535] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa51a61504a [ 1846.362543] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1846.362552] RBP: 00007fa517b89040 R08: 00007fa517b89040 R09: 0000000020000040 [ 1846.362559] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1846.362567] R13: 00000000200000c0 R14: 00007fa517b89000 R15: 00000000200002c0 [ 1846.377069] FAULT_INJECTION: forcing a failure. [ 1846.377069] name failslab, interval 1, probability 0, space 0, times 0 [ 1846.378274] CPU: 0 PID: 23256 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1846.386970] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1846.388262] Call Trace: [ 1846.388677] dump_stack+0x107/0x167 [ 1846.389269] should_fail.cold+0x5/0xa [ 1846.389881] ? vm_area_dup+0x78/0x290 [ 1846.390489] should_failslab+0x5/0x20 [ 1846.391092] kmem_cache_alloc+0x5b/0x310 [ 1846.391735] vm_area_dup+0x78/0x290 [ 1846.392326] ? __lock_acquire+0xbb1/0x5b00 [ 1846.393011] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1846.393843] ? lock_acquire+0x197/0x470 [ 1846.394466] ? copy_process+0x25d6/0x7800 [ 1846.395130] ? vm_area_alloc+0x110/0x110 [ 1846.395763] ? find_held_lock+0x2c/0x110 [ 1846.396414] ? get_mm_exe_file+0x139/0x310 [ 1846.397084] ? lock_downgrade+0x6d0/0x6d0 [ 1846.397741] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1846.398600] ? get_mm_exe_file+0x162/0x310 [ 1846.399271] copy_process+0x291b/0x7800 [ 1846.399898] ? __lock_acquire+0xbb1/0x5b00 [ 1846.400596] ? __cleanup_sighand+0xb0/0xb0 [ 1846.401270] ? lock_acquire+0x197/0x470 [ 1846.401915] ? find_held_lock+0x2c/0x110 [ 1846.402558] kernel_clone+0xe7/0x980 [ 1846.403150] ? lock_downgrade+0x6d0/0x6d0 [ 1846.403801] ? find_held_lock+0x2c/0x110 [ 1846.404441] ? create_io_thread+0xf0/0xf0 [ 1846.405105] ? ksys_write+0x12d/0x260 [ 1846.405719] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1846.406488] __do_sys_fork+0x8a/0xc0 [ 1846.407062] ? kernel_thread+0xf0/0xf0 [ 1846.407689] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1846.408513] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1846.409320] ? trace_hardirqs_on+0x5b/0x180 [ 1846.410008] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1846.410815] do_syscall_64+0x33/0x40 [ 1846.411411] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1846.412220] RIP: 0033:0x7fe69fe62b19 [ 1846.412808] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1846.415672] RSP: 002b:00007fe69d3b7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1846.416851] RAX: ffffffffffffffda RBX: 00007fe69ff76020 RCX: 00007fe69fe62b19 [ 1846.417969] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1846.419073] RBP: 00007fe69d3b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 1846.420186] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1846.421295] R13: 00007ffffc31f9df R14: 00007fe69d3b7300 R15: 0000000000022000 [ 1846.422439] CPU: 1 PID: 23248 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1846.423163] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1846.423981] Call Trace: [ 1846.424249] dump_stack+0x107/0x167 [ 1846.424626] should_fail.cold+0x5/0xa [ 1846.425015] ? __d_alloc+0x2a/0x990 [ 1846.425381] should_failslab+0x5/0x20 [ 1846.425765] kmem_cache_alloc+0x5b/0x310 [ 1846.426169] __d_alloc+0x2a/0x990 [ 1846.426518] d_alloc_cursor+0x3b/0xe0 [ 1846.426922] dcache_dir_open+0x33/0x90 [ 1846.427438] do_dentry_open+0x4b7/0x1090 [ 1846.427836] ? empty_dir_getattr+0x70/0x70 [ 1846.428252] ? may_open+0x1e4/0x400 [ 1846.428609] path_openat+0x1937/0x26e0 [ 1846.428996] ? path_lookupat+0x860/0x860 [ 1846.429404] do_filp_open+0x190/0x3e0 [ 1846.429783] ? may_open_dev+0xf0/0xf0 [ 1846.430162] ? do_raw_spin_lock+0x121/0x260 [ 1846.430582] ? rwlock_bug.part.0+0x90/0x90 [ 1846.431003] ? _raw_spin_unlock+0x1a/0x30 [ 1846.431404] ? __alloc_fd+0x2b8/0x630 [ 1846.431787] do_sys_openat2+0x171/0x420 [ 1846.432188] ? __kasan_slab_free+0x122/0x160 [ 1846.432629] ? build_open_flags+0x6f0/0x6f0 [ 1846.433060] ? __x64_sys_mount+0x227/0x300 [ 1846.433472] ? kfree+0xd7/0x340 [ 1846.433811] __x64_sys_openat+0x13f/0x1f0 [ 1846.434224] ? __ia32_sys_open+0x1c0/0x1c0 [ 1846.434639] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1846.435147] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1846.435655] do_syscall_64+0x33/0x40 [ 1846.436020] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1846.436517] RIP: 0033:0x7f1685823a04 [ 1846.436882] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1846.438651] RSP: 002b:00007f1682de5f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1846.439396] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1685823a04 [ 1846.440088] RDX: 0000000000010000 RSI: 00000000200000c0 RDI: 00000000ffffff9c [ 1846.440776] RBP: 00000000200000c0 R08: 0000000000000000 R09: 0000000020000040 [ 1846.441467] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1846.442162] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 11:38:13 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 20) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:38:13 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 28) 11:38:13 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xee0000, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:38:13 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 31) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) [ 1846.846394] FAULT_INJECTION: forcing a failure. [ 1846.846394] name failslab, interval 1, probability 0, space 0, times 0 [ 1846.847506] CPU: 1 PID: 23671 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1846.848348] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1846.849356] Call Trace: [ 1846.849679] dump_stack+0x107/0x167 [ 1846.850220] should_fail.cold+0x5/0xa [ 1846.850681] ? create_object.isra.0+0x3a/0xa20 [ 1846.851296] should_failslab+0x5/0x20 [ 1846.851735] kmem_cache_alloc+0x5b/0x310 [ 1846.852210] create_object.isra.0+0x3a/0xa20 [ 1846.852727] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1846.853402] __kmalloc_track_caller+0x177/0x370 [ 1846.854055] ? match_number+0xaf/0x1d0 [ 1846.854516] kmemdup_nul+0x2d/0xa0 [ 1846.854927] match_number+0xaf/0x1d0 [ 1846.855356] ? match_u64+0x190/0x190 [ 1846.855787] ? list_lru_walk_node+0x209/0x2b0 11:38:13 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) [ 1846.856314] tracefs_parse_options+0x209/0x550 [ 1846.857015] ? tracefs_show_options+0x1e0/0x1e0 [ 1846.857585] ? get_nr_dirty_inodes+0x19e/0x220 [ 1846.858126] ? __sync_blockdev+0xbe/0xf0 [ 1846.858605] ? sync_filesystem.part.0+0x191/0x1f0 [ 1846.859177] tracefs_remount+0x48/0x90 [ 1846.859761] ? tracefs_apply_options.isra.0+0x950/0x950 [ 1846.860375] legacy_reconfigure+0x11b/0x190 [ 1846.860880] reconfigure_super+0x414/0x9c0 [ 1846.861377] ? fs_umode_to_dtype+0xb0/0xb0 [ 1846.861809] path_mount+0x1ae0/0x2120 [ 1846.862259] ? strncpy_from_user+0x9e/0x470 [ 1846.862760] ? finish_automount+0xa90/0xa90 [ 1846.863375] ? getname_flags.part.0+0x1dd/0x4f0 [ 1846.863917] __x64_sys_mount+0x282/0x300 [ 1846.864381] ? copy_mnt_ns+0xa00/0xa00 [ 1846.864831] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1846.865430] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1846.866037] do_syscall_64+0x33/0x40 [ 1846.866483] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1846.867159] RIP: 0033:0x7fa51a61504a [ 1846.867523] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1846.869745] RSP: 002b:00007fa517b88fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1846.870731] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa51a61504a [ 1846.871371] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1846.872173] RBP: 00007fa517b89040 R08: 00007fa517b89040 R09: 0000000020000040 [ 1846.872994] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1846.873815] R13: 00000000200000c0 R14: 00007fa517b89000 R15: 00000000200002c0 [ 1846.879126] FAULT_INJECTION: forcing a failure. [ 1846.879126] name failslab, interval 1, probability 0, space 0, times 0 [ 1846.880375] CPU: 1 PID: 23669 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1846.881178] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1846.882130] Call Trace: [ 1846.882381] dump_stack+0x107/0x167 [ 1846.882805] should_fail.cold+0x5/0xa [ 1846.883245] ? __d_alloc+0x2a/0x990 [ 1846.883660] should_failslab+0x5/0x20 [ 1846.884090] kmem_cache_alloc+0x5b/0x310 [ 1846.884558] __d_alloc+0x2a/0x990 [ 1846.885106] d_alloc_cursor+0x3b/0xe0 [ 1846.885536] dcache_dir_open+0x33/0x90 [ 1846.885929] do_dentry_open+0x4b7/0x1090 [ 1846.886401] ? empty_dir_getattr+0x70/0x70 [ 1846.886901] ? may_open+0x1e4/0x400 [ 1846.887404] path_openat+0x1937/0x26e0 [ 1846.887921] ? path_lookupat+0x860/0x860 [ 1846.888389] do_filp_open+0x190/0x3e0 [ 1846.888820] ? may_open_dev+0xf0/0xf0 [ 1846.889265] ? do_raw_spin_lock+0x121/0x260 [ 1846.889757] ? rwlock_bug.part.0+0x90/0x90 [ 1846.890329] ? _raw_spin_unlock+0x1a/0x30 [ 1846.890795] ? __alloc_fd+0x2b8/0x630 [ 1846.891173] do_sys_openat2+0x171/0x420 [ 1846.891628] ? __kasan_slab_free+0x122/0x160 [ 1846.892051] ? build_open_flags+0x6f0/0x6f0 [ 1846.892546] ? __x64_sys_mount+0x227/0x300 [ 1846.892925] ? kfree+0xd7/0x340 [ 1846.893432] __x64_sys_openat+0x13f/0x1f0 [ 1846.893918] ? __ia32_sys_open+0x1c0/0x1c0 [ 1846.894403] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1846.894989] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1846.895704] do_syscall_64+0x33/0x40 [ 1846.896212] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1846.896794] RIP: 0033:0x7f1685823a04 [ 1846.897214] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1846.899417] RSP: 002b:00007f1682de5f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1846.900280] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1685823a04 [ 1846.901076] RDX: 0000000000010000 RSI: 00000000200000c0 RDI: 00000000ffffff9c [ 1846.901879] RBP: 00000000200000c0 R08: 0000000000000000 R09: 0000000020000040 [ 1846.902683] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1846.903320] R13: 00000000200000c0 R14: 00007f1682de6000 R15: 00000000200002c0 [ 1846.911780] FAULT_INJECTION: forcing a failure. [ 1846.911780] name failslab, interval 1, probability 0, space 0, times 0 [ 1846.914450] CPU: 0 PID: 23667 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1846.915618] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1846.916958] Call Trace: [ 1846.917394] dump_stack+0x107/0x167 [ 1846.918008] should_fail.cold+0x5/0xa [ 1846.918628] ? create_object.isra.0+0x3a/0xa20 [ 1846.919380] should_failslab+0x5/0x20 [ 1846.920005] kmem_cache_alloc+0x5b/0x310 [ 1846.920669] create_object.isra.0+0x3a/0xa20 [ 1846.921394] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1846.922236] kmem_cache_alloc+0x159/0x310 [ 1846.922923] vm_area_dup+0x78/0x290 [ 1846.923531] ? __lock_acquire+0xbb1/0x5b00 [ 1846.924242] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1846.925098] ? lock_acquire+0x197/0x470 [ 1846.925868] ? copy_process+0x25d6/0x7800 [ 1846.926545] ? vm_area_alloc+0x110/0x110 [ 1846.927210] ? find_held_lock+0x2c/0x110 [ 1846.927880] ? get_mm_exe_file+0x139/0x310 [ 1846.928570] ? lock_downgrade+0x6d0/0x6d0 [ 1846.929239] ? down_write_nested+0xe4/0x160 [ 1846.929949] ? rwsem_down_write_slowpath+0xc30/0xc30 [ 1846.930779] ? get_mm_exe_file+0x162/0x310 [ 1846.931479] copy_process+0x291b/0x7800 [ 1846.932136] ? __lock_acquire+0xbb1/0x5b00 [ 1846.932852] ? __cleanup_sighand+0xb0/0xb0 [ 1846.933550] ? lock_acquire+0x197/0x470 [ 1846.934221] ? find_held_lock+0x2c/0x110 [ 1846.934888] kernel_clone+0xe7/0x980 [ 1846.935499] ? lock_downgrade+0x6d0/0x6d0 [ 1846.936174] ? find_held_lock+0x2c/0x110 [ 1846.936834] ? create_io_thread+0xf0/0xf0 [ 1846.937516] ? ksys_write+0x12d/0x260 [ 1846.938157] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1846.938952] __do_sys_fork+0x8a/0xc0 [ 1846.939552] ? kernel_thread+0xf0/0xf0 [ 1846.940197] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1846.941052] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1846.941878] ? trace_hardirqs_on+0x5b/0x180 [ 1846.942581] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1846.943409] do_syscall_64+0x33/0x40 [ 1846.944012] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1846.944829] RIP: 0033:0x7fe69fe62b19 [ 1846.945418] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1846.948269] RSP: 002b:00007fe69d3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1846.949494] RAX: ffffffffffffffda RBX: 00007fe69ff75f60 RCX: 00007fe69fe62b19 [ 1846.950649] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1846.951800] RBP: 00007fe69d3d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1846.952950] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1846.954101] R13: 00007ffffc31f9df R14: 00007fe69d3d8300 R15: 0000000000022000 11:38:28 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f00005ef000/0x4000)=nil, 0x4000, 0x4, 0x12010, r0, 0x8000000) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:38:28 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 21) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:38:28 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 32) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:38:28 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x1000000, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:38:28 executing program 3: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000014c0)='cgroup.freeze\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r2, &(0x7f0000001600)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000015c0)={&(0x7f0000001540)={0x44, 0x0, 0x800, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8, 0x7, 0x5}, @ETHTOOL_A_RINGS_RX_MINI={0x8}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x8000}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0xfffffff8}, @ETHTOOL_A_RINGS_RX_MINI={0x8, 0x7, 0x7}, @ETHTOOL_A_RINGS_TX={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x40014) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) fork() 11:38:28 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xfeffff7f, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:38:28 executing program 7: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r1 = syz_io_uring_complete(0x0) mmap$IORING_OFF_SQ_RING(&(0x7f00005f6000/0x1000)=nil, 0x1000, 0x3000000, 0x80010, r1, 0x0) syz_io_uring_setup(0x4329, &(0x7f00000001c0)={0x0, 0x4c50, 0x1, 0x0, 0x2ad, 0x0, r1}, &(0x7f00005d8000/0x4000)=nil, &(0x7f00005f7000/0x12000)=nil, &(0x7f0000000400), &(0x7f0000000440)) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000180)={'veth1\x00', {0x2, 0x0, @private}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000280)={'ip6_vti0\x00', &(0x7f0000000500)={'syztnl0\x00', 0x0, 0x29, 0x5, 0x69, 0x1, 0x10, @remote, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, 0x1, 0x7800, 0x3ff, 0x5}}) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@can={0x1d, r3}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0xbd07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) fork() [ 1861.333138] FAULT_INJECTION: forcing a failure. [ 1861.333138] name failslab, interval 1, probability 0, space 0, times 0 [ 1861.335087] CPU: 0 PID: 23794 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1861.336141] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1861.337394] Call Trace: [ 1861.337805] dump_stack+0x107/0x167 [ 1861.338378] should_fail.cold+0x5/0xa [ 1861.338970] should_failslab+0x5/0x20 [ 1861.339553] __kmalloc_track_caller+0x79/0x370 [ 1861.340389] ? match_number+0xaf/0x1d0 [ 1861.340963] ? kfree+0xd7/0x340 [ 1861.341449] kmemdup_nul+0x2d/0xa0 [ 1861.341986] match_number+0xaf/0x1d0 [ 1861.342537] ? match_u64+0x190/0x190 [ 1861.343087] ? list_lru_walk_node+0x209/0x2b0 [ 1861.343766] tracefs_parse_options+0x36b/0x550 [ 1861.344441] ? tracefs_show_options+0x1e0/0x1e0 [ 1861.345132] ? get_nr_dirty_inodes+0x19e/0x220 [ 1861.345817] ? __sync_blockdev+0xbe/0xf0 [ 1861.346422] ? sync_filesystem.part.0+0x191/0x1f0 [ 1861.347137] tracefs_remount+0x48/0x90 [ 1861.347716] ? tracefs_apply_options.isra.0+0x950/0x950 [ 1861.348497] legacy_reconfigure+0x11b/0x190 [ 1861.349137] reconfigure_super+0x414/0x9c0 [ 1861.349762] ? fs_umode_to_dtype+0xb0/0xb0 [ 1861.350389] path_mount+0x1ae0/0x2120 [ 1861.350961] ? strncpy_from_user+0x9e/0x470 [ 1861.351597] ? finish_automount+0xa90/0xa90 [ 1861.352241] ? getname_flags.part.0+0x1dd/0x4f0 [ 1861.352939] __x64_sys_mount+0x282/0x300 [ 1861.353537] ? copy_mnt_ns+0xa00/0xa00 [ 1861.354133] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1861.354918] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1861.355686] do_syscall_64+0x33/0x40 [ 1861.356236] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1861.356992] RIP: 0033:0x7fa51a61504a [ 1861.357541] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1861.360252] RSP: 002b:00007fa517b88fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1861.361390] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa51a61504a [ 1861.362437] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1861.363472] RBP: 00007fa517b89040 R08: 00007fa517b89040 R09: 0000000020000040 [ 1861.364515] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1861.365745] R13: 00000000200000c0 R14: 00007fa517b89000 R15: 00000000200002c0 [ 1861.401147] FAULT_INJECTION: forcing a failure. [ 1861.401147] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1861.402805] CPU: 1 PID: 23798 Comm: syz-executor.0 Not tainted 5.10.209 #1 [ 1861.403401] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1861.404133] Call Trace: [ 1861.404363] dump_stack+0x107/0x167 [ 1861.404687] should_fail.cold+0x5/0xa [ 1861.405027] _copy_to_user+0x2e/0x180 [ 1861.405373] simple_read_from_buffer+0xcc/0x160 [ 1861.405795] proc_fail_nth_read+0x198/0x230 [ 1861.406181] ? proc_sessionid_read+0x230/0x230 [ 1861.406585] ? security_file_permission+0x24e/0x570 [ 1861.407025] ? perf_trace_initcall_start+0x101/0x380 [ 1861.407658] ? proc_sessionid_read+0x230/0x230 [ 1861.408061] vfs_read+0x228/0x580 [ 1861.408386] ksys_read+0x12d/0x260 [ 1861.408693] ? vfs_write+0xa70/0xa70 [ 1861.409006] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1861.409461] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1861.409900] do_syscall_64+0x33/0x40 [ 1861.410228] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1861.410654] RIP: 0033:0x7f168582369c [ 1861.410980] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1861.412503] RSP: 002b:00007f1682de6170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1861.413128] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 00007f168582369c [ 1861.413722] RDX: 000000000000000f RSI: 00007f1682de61e0 RDI: 0000000000000006 [ 1861.414318] RBP: 00007f1682de61d0 R08: 0000000000000000 R09: 0000000020000040 [ 1861.414918] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1861.415503] R13: 00007fff9b98d59f R14: 00007f1682de6300 R15: 0000000000022000 [ 1861.856344] FAULT_INJECTION: forcing a failure. [ 1861.856344] name failslab, interval 1, probability 0, space 0, times 0 [ 1861.858483] CPU: 0 PID: 24214 Comm: syz-executor.4 Not tainted 5.10.209 #1 [ 1861.859504] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1861.860707] Call Trace: [ 1861.861099] dump_stack+0x107/0x167 [ 1861.861639] should_fail.cold+0x5/0xa [ 1861.862205] ? create_object.isra.0+0x3a/0xa20 [ 1861.862879] should_failslab+0x5/0x20 [ 1861.863436] kmem_cache_alloc+0x5b/0x310 [ 1861.864037] create_object.isra.0+0x3a/0xa20 [ 1861.864678] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1861.865426] __kmalloc_track_caller+0x177/0x370 [ 1861.866110] ? match_number+0xaf/0x1d0 [ 1861.866687] kmemdup_nul+0x2d/0xa0 [ 1861.867213] match_number+0xaf/0x1d0 [ 1861.867754] ? match_u64+0x190/0x190 [ 1861.868298] ? list_lru_walk_node+0x209/0x2b0 [ 1861.868964] tracefs_parse_options+0x36b/0x550 [ 1861.869638] ? tracefs_show_options+0x1e0/0x1e0 [ 1861.870327] ? get_nr_dirty_inodes+0x19e/0x220 [ 1861.870998] ? __sync_blockdev+0xbe/0xf0 [ 1861.871586] ? sync_filesystem.part.0+0x191/0x1f0 [ 1861.872286] tracefs_remount+0x48/0x90 [ 1861.872849] ? tracefs_apply_options.isra.0+0x950/0x950 [ 1861.873623] legacy_reconfigure+0x11b/0x190 [ 1861.874259] reconfigure_super+0x414/0x9c0 [ 1861.874875] ? fs_umode_to_dtype+0xb0/0xb0 [ 1861.875491] path_mount+0x1ae0/0x2120 [ 1861.876047] ? strncpy_from_user+0x9e/0x470 [ 1861.876673] ? finish_automount+0xa90/0xa90 [ 1861.877298] ? getname_flags.part.0+0x1dd/0x4f0 [ 1861.877989] __x64_sys_mount+0x282/0x300 [ 1861.878600] ? copy_mnt_ns+0xa00/0xa00 [ 1861.879181] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1861.879938] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1861.880691] do_syscall_64+0x33/0x40 [ 1861.881233] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1861.881988] RIP: 0033:0x7fa51a61504a [ 1861.882527] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1861.885165] RSP: 002b:00007fa517b88fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1861.886271] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa51a61504a [ 1861.887304] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1861.888335] RBP: 00007fa517b89040 R08: 00007fa517b89040 R09: 0000000020000040 [ 1861.889368] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 1861.890396] R13: 00000000200000c0 R14: 00007fa517b89000 R15: 00000000200002c0 11:38:28 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 29) [ 1862.028657] FAULT_INJECTION: forcing a failure. [ 1862.028657] name failslab, interval 1, probability 0, space 0, times 0 [ 1862.029652] CPU: 1 PID: 24217 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1862.030245] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1862.030946] Call Trace: [ 1862.031186] dump_stack+0x107/0x167 [ 1862.031508] should_fail.cold+0x5/0xa [ 1862.031847] ? vm_area_dup+0x78/0x290 [ 1862.032195] should_failslab+0x5/0x20 [ 1862.032526] kmem_cache_alloc+0x5b/0x310 [ 1862.032871] vm_area_dup+0x78/0x290 [ 1862.033208] ? copy_page_range+0x24e9/0x3810 [ 1862.033616] ? vm_area_alloc+0x110/0x110 [ 1862.033981] ? find_held_lock+0x2c/0x110 [ 1862.034332] ? vm_iomap_memory+0x190/0x190 [ 1862.034712] ? __vma_link_rb+0x540/0x700 [ 1862.035073] copy_process+0x291b/0x7800 [ 1862.035452] ? __cleanup_sighand+0xb0/0xb0 [ 1862.035816] ? lock_acquire+0x197/0x470 [ 1862.036163] ? find_held_lock+0x2c/0x110 [ 1862.036514] kernel_clone+0xe7/0x980 [ 1862.036845] ? lock_downgrade+0x6d0/0x6d0 [ 1862.037196] ? find_held_lock+0x2c/0x110 [ 1862.037540] ? create_io_thread+0xf0/0xf0 [ 1862.037906] ? ksys_write+0x12d/0x260 [ 1862.038235] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1862.038650] __do_sys_fork+0x8a/0xc0 [ 1862.038969] ? kernel_thread+0xf0/0xf0 [ 1862.039311] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1862.039750] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1862.040199] ? trace_hardirqs_on+0x5b/0x180 [ 1862.040589] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1862.041019] do_syscall_64+0x33/0x40 [ 1862.041338] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1862.041779] RIP: 0033:0x7fe69fe62b19 [ 1862.042112] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1862.043644] RSP: 002b:00007fe69d3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1862.044296] RAX: ffffffffffffffda RBX: 00007fe69ff75f60 RCX: 00007fe69fe62b19 [ 1862.045079] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1862.045678] RBP: 00007fe69d3d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1862.046284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1862.046869] R13: 00007ffffc31f9df R14: 00007fe69d3d8300 R15: 0000000000022000 11:38:28 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x2000000, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:38:28 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) 11:38:28 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) 11:38:28 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000007c0)=ANY=[@ANYBLOB="01210020010000000200000082b5159eac31a07c54a37b6c411881eeb98afe70a4f6631abac45eed671c0dc0efb565e1a0a30fb3490fd31082825555c60e56ff2db848261f3289e3223daba4e3be487a6e420377fc3671b67fc94af3fdcc868eb5cfaee6f55b3bfd20cbb12a69ad5fc4758132e7260c9bf9b634ca48a7525688523b7872ac91006dd8fe61eb837522e9b43d189e8d641f82845dec0078b010d5ee7cc7f1838d246d97a2ff39e7e72479d31aa6e2b9a9c8c470a27392979313cea22b92a372a3c0c9d4121e22a18da4dca2cd02394b0c6590857d0d022a8ada598876c8351fac1b1622c03f6438c2c16427a70cd4ce", @ANYRES32, @ANYBLOB="01800000000000002e2f66696c653000"]) r3 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) (fail_nth: 22) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x722e}}, './file0\x00'}) 11:38:28 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) syz_io_uring_setup(0x345, &(0x7f0000000400)={0x0, 0x9c38, 0x8, 0x2, 0x2bd, 0x0, r3}, &(0x7f00001d5000/0x1000)=nil, &(0x7f00001a0000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000280)) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) r5 = syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r9 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x10, r8, 0x0) syz_io_uring_complete(r9) r10 = mmap$IORING_OFF_SQES(&(0x7f000031d000/0x4000)=nil, 0x4000, 0x2, 0x13, r5, 0x10000000) r11 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(r9, r10, &(0x7f0000000180)=@IORING_OP_ASYNC_CANCEL={0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r11}}, 0x2) syz_io_uring_submit(r6, r7, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) fork() 11:38:28 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r2, 0x80, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth1\x00'}}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000340)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xca\x1d\b6\xdd\xda\xacNB\xc9\x01\x00\x00\x00\x00\x00\x00\x00\xa7\x8d^\x1b\xce\x95\x8a\x82l\x01\xb92)]\xbc\xc8\xf0g\xd7B/\x95\xb4\xc8\x00\x01\x00\x00\x05\xa6R\xc5\xab\x90\"\xa0\xda\xbc\x7f\x1d\x1aot\xfdK\xe2\x8c\x9c\xed\x00*\xf7\x8ds\x0f2[6[\xa4$\x13\x195\xc60)\xa1w*`7\xac\xee\xfd\xfa\xa8\xc7\xa1\xa0=_5P\x0e\x8bM\xfd\x87\xc2Y\x9e\xa4\x0fNd\x96\x1f=\xf3\x1b\xf5\xf5E\xdf\x00\x00\x00\x00\x00\x00\x00vv\xb1\xb9\x83\xa1\x17.\xd5@\x9a\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf0\xa7\xffCF\x8a\xb6t.\xe53^\xfaMu\xd1\'\xb3\xf5\xa3(\x8d9\xa4l\xf1\xf7\v\x8d\fMFu\xbb\xef(\xce\xaa)\xec\x05\xa9\xd0y?\x83_\xaf&\'\xc8<\xe7P.\xd5\xc7\x8b*4a\x8ak\x1d\x18I\x91;\nsj\x97D`\xb6\x9f,\f\xd7\x91$\xbc\x1eL', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) fork() 11:38:29 executing program 2: syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000480)={0x0, 0x9d07, 0x10, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000246000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000140)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x440282, 0x0) fork() (fail_nth: 30) 11:38:29 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) [ 1862.424592] FAULT_INJECTION: forcing a failure. [ 1862.424592] name failslab, interval 1, probability 0, space 0, times 0 [ 1862.426038] CPU: 0 PID: 24326 Comm: syz-executor.2 Not tainted 5.10.209 #1 [ 1862.426878] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1862.427878] Call Trace: [ 1862.428206] dump_stack+0x107/0x167 [ 1862.428657] should_fail.cold+0x5/0xa [ 1862.429130] ? create_object.isra.0+0x3a/0xa20 [ 1862.429690] should_failslab+0x5/0x20 [ 1862.430166] kmem_cache_alloc+0x5b/0x310 [ 1862.430669] create_object.isra.0+0x3a/0xa20 [ 1862.431211] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1862.431836] kmem_cache_alloc+0x159/0x310 [ 1862.432353] vm_area_dup+0x78/0x290 [ 1862.432811] ? copy_page_range+0x24e9/0x3810 [ 1862.433376] ? vm_area_alloc+0x110/0x110 [ 1862.433878] ? find_held_lock+0x2c/0x110 [ 1862.434380] ? vm_iomap_memory+0x190/0x190 [ 1862.434913] ? __vma_link_rb+0x540/0x700 [ 1862.435414] copy_process+0x291b/0x7800 [ 1862.435922] ? __cleanup_sighand+0xb0/0xb0 [ 1862.436441] ? lock_acquire+0x197/0x470 [ 1862.436927] ? find_held_lock+0x2c/0x110 [ 1862.437423] kernel_clone+0xe7/0x980 [ 1862.437885] ? lock_downgrade+0x6d0/0x6d0 [ 1862.438388] ? find_held_lock+0x2c/0x110 [ 1862.438878] ? create_io_thread+0xf0/0xf0 [ 1862.439361] ? ksys_write+0x12d/0x260 [ 1862.439832] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1862.440420] __do_sys_fork+0x8a/0xc0 [ 1862.440872] ? kernel_thread+0xf0/0xf0 [ 1862.441357] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1862.442000] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1862.442623] ? trace_hardirqs_on+0x5b/0x180 [ 1862.443142] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1862.443763] do_syscall_64+0x33/0x40 [ 1862.444209] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1862.444822] RIP: 0033:0x7fe69fe62b19 [ 1862.445279] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1862.447486] RSP: 002b:00007fe69d3d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1862.448401] RAX: ffffffffffffffda RBX: 00007fe69ff75f60 RCX: 00007fe69fe62b19 [ 1862.449255] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1862.450119] RBP: 00007fe69d3d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1862.450970] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1862.451830] R13: 00007ffffc31f9df R14: 00007fe69d3d8300 R15: 0000000000022000 11:38:29 executing program 3: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x800, 0x4, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_io_uring_submit(0x0, r1, &(0x7f0000001840)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001880), &(0x7f0000000000)='./file0\x00', 0x7ff, 0x800}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x386b1}, 0x8) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) fork() r5 = mmap$IORING_OFF_SQES(&(0x7f000001e000/0x4000)=nil, 0x4000, 0x7, 0x110, r0, 0x10000000) syz_io_uring_submit(0x0, r5, &(0x7f0000001800)=@IORING_OP_RECVMSG={0xa, 0x1, 0x0, r2, 0x0, &(0x7f00000017c0)={&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000000200)=""/102, 0x66}, {&(0x7f0000001340)=""/76, 0x4c}, {&(0x7f00000013c0)=""/159, 0x9f}, {&(0x7f0000001480)=""/132, 0x84}, {&(0x7f0000000280)=""/59, 0x3b}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001540)=""/66, 0x42}, {&(0x7f0000002e00)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/114, 0x72}], 0xa, &(0x7f0000001980)=""/195, 0xc3}, 0x0, 0x40, 0x1, {0x1}}, 0x4) 11:38:29 executing program 5: lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x4000000, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2, {0x722e}}, './file0\x00'}) 11:38:30 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000001240)='\x00', 0x20003, 0x1a9) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x20020, &(0x7f00000002c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c73697a653d6b256d2d3474c82c6d6f64653d30303030303030303030303030303030303037373032332c6769643d", @ANYRESHEX=0xee00, @ANYBLOB="00040000ff9bd492c35891f93cc82c5208cc4494fe3e98f509c1c3338615e16a81d0bafbc05ac21892e21277a6142459205ead9b70f20dd2bec43edb079c8958f0b8b9313ab1ee5392654f9119f2c9089bc0b39b2a1e8479087932fd4ab56741ce18c3e6caaa5b5a4166c408e5885dd946eb5f9aa9728f5bd3f112c9bc2c12afd9f094101bfd61c9000000007a1f0252fcc51e984699bafd139660222456c09d034f6d0205e2a01b744bfb14cecda511aefc6352b7"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000140)=0x68) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) [ 1863.565989] systemd-udevd invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 1863.566992] CPU: 0 PID: 24645 Comm: systemd-udevd Not tainted 5.10.209 #1 [ 1863.567540] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1863.568205] Call Trace: [ 1863.568423] dump_stack+0x107/0x167 [ 1863.568721] dump_header+0x106/0x655 [ 1863.569019] oom_kill_process.cold+0x10/0x15 [ 1863.569373] out_of_memory+0x1149/0x1440 [ 1863.569709] ? oom_killer_disable+0x280/0x280 [ 1863.570091] ? mutex_trylock+0x237/0x2b0 [ 1863.570431] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2130 [ 1863.570911] __alloc_pages_slowpath.constprop.0+0x1b25/0x2130 [ 1863.571392] ? lock_acquire+0x137/0x470 [ 1863.571716] ? warn_alloc+0x190/0x190 [ 1863.572034] __alloc_pages_nodemask+0x51d/0x600 [ 1863.572405] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 1863.572893] alloc_pages_vma+0xbb/0x410 [ 1863.573227] wp_page_copy+0x1c3/0x1f00 [ 1863.573541] ? print_bad_pte+0x5a0/0x5a0 [ 1863.573874] ? lock_downgrade+0x6d0/0x6d0 [ 1863.574203] ? vm_normal_page+0x162/0x2e0 [ 1863.574546] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1863.574976] do_wp_page+0x27b/0x1390 [ 1863.575280] handle_mm_fault+0x1cc7/0x3500 [ 1863.575634] ? _raw_spin_unlock_irq+0x27/0x30 [ 1863.576000] ? find_held_lock+0x2c/0x110 [ 1863.576331] ? __pmd_alloc+0x5e0/0x5e0 [ 1863.576652] ? vmacache_find+0x55/0x2a0 [ 1863.576979] do_user_addr_fault+0x56e/0xc60 [ 1863.577333] exc_page_fault+0xa2/0x1a0 [ 1863.577648] ? asm_exc_page_fault+0x8/0x30 [ 1863.577993] asm_exc_page_fault+0x1e/0x30 [ 1863.578334] RIP: 0033:0x7f6e6c3e478e [ 1863.578637] Code: c2 81 e2 7f 01 00 00 83 e0 7c 0f 85 7c 00 00 00 53 48 83 ec 10 85 d2 75 7b 8b 0d e5 5c 01 00 85 c9 75 39 31 c0 ba 01 00 00 00 0f b1 17 0f 85 98 00 00 00 8b 57 08 85 d2 0f 85 42 01 00 00 64 [ 1863.580120] RSP: 002b:00007ffc65deec50 EFLAGS: 00010246 [ 1863.580551] RAX: 0000000000000000 RBX: 000055576acfbfd0 RCX: 0000000000000000 [ 1863.581120] RDX: 0000000000000001 RSI: 000055576b4b32f0 RDI: 000055576acfbfe0 [ 1863.581702] RBP: 000055576b4b32f0 R08: 0000000000000000 R09: 0000000000000000 [ 1863.582286] R10: 000055576b4b32fe R11: 000055576b4b32f0 R12: 0000000000000000 [ 1863.582853] R13: 0000000000000000 R14: 000000000000a000 R15: 000055576b4b32f0 [ 1863.583480] Mem-Info: [ 1863.583705] active_anon:5356 inactive_anon:68061 isolated_anon:0 [ 1863.583705] active_file:1044 inactive_file:811 isolated_file:21 [ 1863.583705] unevictable:0 dirty:33 writeback:0 [ 1863.583705] slab_reclaimable:7070 slab_unreclaimable:69089 [ 1863.583705] mapped:70671 shmem:121 pagetables:5886 bounce:0 [ 1863.583705] free:4538 free_pcp:71 free_cma:0 [ 1863.586284] Node 0 active_anon:21424kB inactive_anon:272244kB active_file:4176kB inactive_file:3244kB unevictable:0kB isolated(anon):0kB isolated(file):84kB mapped:282684kB dirty:132kB writeback:0kB shmem:484kB writeback_tmp:0kB kernel_stack:9024kB all_unreclaimable? no [ 1863.588202] Node 0 DMA free:6508kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:1208kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1863.590307] lowmem_reserve[]: 0 1616 1616 1616 [ 1863.590701] Node 0 DMA32 free:11644kB min:17744kB low:19396kB high:21048kB reserved_highatomic:2048KB active_anon:21424kB inactive_anon:271036kB active_file:4068kB inactive_file:3988kB unevictable:0kB writepending:132kB present:2080640kB managed:1660484kB mlocked:0kB pagetables:23544kB bounce:0kB free_pcp:356kB local_pcp:144kB free_cma:0kB [ 1863.593087] lowmem_reserve[]: 0 0 0 0 [ 1863.593417] Node 0 DMA: 1*4kB (U) 1*8kB (M) 0*16kB 1*32kB (U) 3*64kB (UM) 1*128kB (U) 2*256kB (UM) 1*512kB (M) 1*1024kB (U) 0*2048kB 1*4096kB (M) = 6508kB [ 1863.594694] Node 0 DMA32: 1112*4kB (UMEH) 392*8kB (UMEH) 237*16kB (UMEH) 19*32kB (UMEH) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 11984kB [ 1863.595925] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1863.596593] 1877 total pagecache pages [ 1863.596934] 0 pages in swap cache [ 1863.597210] Swap cache stats: add 0, delete 0, find 0/0 [ 1863.597636] Free swap = 0kB [ 1863.597899] Total swap = 0kB [ 1863.598148] 524158 pages RAM [ 1863.598389] 0 pages HighMem/MovableOnly [ 1863.598705] 105060 pages reserved [ 1863.599000] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/systemd-udevd.service,task=systemd-udevd,pid=24645,uid=0 [ 1863.601070] Out of memory (oom_kill_allocating_task): Killed process 24645 (systemd-udevd) total-vm:35620kB, anon-rss:10180kB, file-rss:520kB, shmem-rss:0kB, UID:0 pgtables:76kB oom_score_adj:0 [ 1863.605855] in:imklog invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 1863.607167] CPU: 1 PID: 196 Comm: in:imklog Not tainted 5.10.209 #1 [ 1863.607684] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1863.608362] Call Trace: [ 1863.608586] dump_stack+0x107/0x167 [ 1863.608893] dump_header+0x106/0x655 [ 1863.609201] oom_kill_process.cold+0x10/0x15 [ 1863.609583] out_of_memory+0x1149/0x1440 [ 1863.609933] ? oom_killer_disable+0x280/0x280 [ 1863.610312] ? mutex_trylock+0x237/0x2b0 [ 1863.610656] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2130 [ 1863.611160] __alloc_pages_slowpath.constprop.0+0x1b25/0x2130 [ 1863.611649] ? lock_acquire+0x137/0x470 [ 1863.611985] ? warn_alloc+0x190/0x190 [ 1863.612315] __alloc_pages_nodemask+0x51d/0x600 [ 1863.612699] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 1863.613202] ? find_get_entry+0x2c8/0x740 [ 1863.613549] alloc_pages_current+0x187/0x280 [ 1863.613935] __page_cache_alloc+0x2d2/0x360 [ 1863.614296] pagecache_get_page+0x2c7/0xc80 [ 1863.614657] filemap_fault+0x177d/0x2210 [ 1863.615011] ? read_cache_page_gfp+0x30/0x30 [ 1863.615378] ? replace_page_cache_page+0x1200/0x1200 [ 1863.615807] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1863.616244] ext4_filemap_fault+0x87/0xc0 [ 1863.616589] __do_fault+0x113/0x410 [ 1863.616902] handle_mm_fault+0x1e53/0x3500 [ 1863.617255] ? fsnotify+0xf50/0xf50 [ 1863.617560] ? __pmd_alloc+0x5e0/0x5e0 [ 1863.617891] ? vmacache_find+0x55/0x2a0 [ 1863.618219] ? vmacache_update+0xce/0x140 [ 1863.618567] do_user_addr_fault+0x56e/0xc60 [ 1863.618928] exc_page_fault+0xa2/0x1a0 [ 1863.619260] ? asm_exc_page_fault+0x8/0x30 [ 1863.619607] asm_exc_page_fault+0x1e/0x30 [ 1863.619957] RIP: 0033:0x7f4c5fa9408c [ 1863.620266] Code: Unable to access opcode bytes at RIP 0x7f4c5fa94062. [ 1863.620804] RSP: 002b:00007f4c5f0304d0 EFLAGS: 00010246 [ 1863.621251] RAX: 0000000000000b40 RBX: 0000000000000000 RCX: 00007f4c5fa9408c [ 1863.621849] RDX: 0000000000001fa0 RSI: 00007f4c5f030d00 RDI: 0000000000000005 [ 1863.622437] RBP: 000055c9a6c834c0 R08: 0000000000000000 R09: 0000000000000000 [ 1863.623029] R10: a3d70a3d70a3d70b R11: 0000000000000246 R12: 00007f4c5f030d00 [ 1863.623611] R13: 0000000000001fa0 R14: 00007f4c5f030d00 R15: 00007f4c5f031775 [ 1863.624240] Mem-Info: [ 1863.624473] active_anon:5356 inactive_anon:68061 isolated_anon:0 [ 1863.624473] active_file:804 inactive_file:603 isolated_file:0 [ 1863.624473] unevictable:0 dirty:33 writeback:0 [ 1863.624473] slab_reclaimable:7070 slab_unreclaimable:69089 [ 1863.624473] mapped:70251 shmem:121 pagetables:5886 bounce:0 [ 1863.624473] free:4916 free_pcp:112 free_cma:0 [ 1863.627994] Node 0 active_anon:21424kB inactive_anon:272244kB active_file:3300kB inactive_file:2492kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:280920kB dirty:132kB writeback:0kB shmem:484kB writeback_tmp:0kB kernel_stack:9024kB all_unreclaimable? no [ 1863.630729] Node 0 DMA free:6508kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:1208kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1863.633142] lowmem_reserve[]: 0 1616 1616 1616 [ 1863.633542] Node 0 DMA32 free:12524kB min:5116kB low:6768kB high:8420kB reserved_highatomic:2048KB active_anon:21424kB inactive_anon:271036kB active_file:4068kB inactive_file:2940kB unevictable:0kB writepending:132kB present:2080640kB managed:1660484kB mlocked:0kB pagetables:23544kB bounce:0kB free_pcp:464kB local_pcp:0kB free_cma:0kB [ 1863.637288] lowmem_reserve[]: 0 0 0 0 [ 1863.637747] Node 0 DMA: 1*4kB (U) 1*8kB (M) 0*16kB 1*32kB (U) 3*64kB (UM) 1*128kB (U) 2*256kB (UM) 1*512kB (M) 1*1024kB (U) 0*2048kB 1*4096kB (M) = 6508kB [ 1863.639529] Node 0 DMA32: 1066*4kB (UMEH) 472*8kB (UMEH) 238*16kB (UMEH) 19*32kB (UMEH) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12456kB [ 1863.640975] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1863.641866] 1961 total pagecache pages [ 1863.642303] 0 pages in swap cache [ 1863.642647] Swap cache stats: add 0, delete 0, find 0/0 [ 1863.643200] Free swap = 0kB [ 1863.643540] Total swap = 0kB [ 1863.643818] 524158 pages RAM [ 1863.644152] 0 pages HighMem/MovableOnly [ 1863.644507] 105060 pages reserved [ 1863.644871] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/rsyslog.service,task=in:imklog,pid=196,uid=0 [ 1863.647682] Out of memory (oom_kill_allocating_task): Killed process 190 (rsyslogd) total-vm:220876kB, anon-rss:1060kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:76kB oom_score_adj:0 [ 1863.694535] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 1863.695375] CPU: 1 PID: 6349 Comm: syz-fuzzer Not tainted 5.10.209 #1 [ 1863.695908] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1863.696588] Call Trace: [ 1863.696810] dump_stack+0x107/0x167 [ 1863.697116] dump_header+0x106/0x655 [ 1863.697435] oom_kill_process.cold+0x10/0x15 [ 1863.697802] out_of_memory+0x1149/0x1440 [ 1863.698149] ? oom_killer_disable+0x280/0x280 [ 1863.698518] ? mutex_trylock+0x237/0x2b0 [ 1863.698861] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2130 [ 1863.699352] __alloc_pages_slowpath.constprop.0+0x1b25/0x2130 [ 1863.699839] ? lock_acquire+0x137/0x470 [ 1863.700167] ? warn_alloc+0x190/0x190 [ 1863.700495] __alloc_pages_nodemask+0x51d/0x600 [ 1863.700885] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 1863.701386] ? find_get_entry+0x2c8/0x740 [ 1863.701729] alloc_pages_current+0x187/0x280 [ 1863.702103] __page_cache_alloc+0x2d2/0x360 [ 1863.702461] pagecache_get_page+0x2c7/0xc80 [ 1863.702830] filemap_fault+0x177d/0x2210 [ 1863.703180] ? read_cache_page_gfp+0x30/0x30 [ 1863.703543] ? replace_page_cache_page+0x1200/0x1200 [ 1863.703957] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1863.704394] ext4_filemap_fault+0x87/0xc0 [ 1863.704733] __do_fault+0x113/0x410 [ 1863.705034] handle_mm_fault+0x1e53/0x3500 [ 1863.705384] ? find_held_lock+0x2c/0x110 [ 1863.705715] ? __pmd_alloc+0x5e0/0x5e0 [ 1863.706048] ? vmacache_find+0x55/0x2a0 [ 1863.706380] do_user_addr_fault+0x56e/0xc60 [ 1863.706747] exc_page_fault+0xa2/0x1a0 [ 1863.707070] ? asm_exc_page_fault+0x8/0x30 [ 1863.707417] asm_exc_page_fault+0x1e/0x30 [ 1863.707754] RIP: 0033:0x4024a1 [ 1863.708020] Code: c3 c5 f8 77 48 83 fb 08 76 1b 48 8b 0e 48 8b 17 48 83 c6 08 48 83 c7 08 48 83 eb 08 48 39 d1 74 e3 c6 00 00 c3 48 8b 4c 1e f8 <48> 8b 54 1f f8 48 39 d1 0f 94 00 c3 48 83 fb 00 74 37 48 8d 0c dd [ 1863.709507] RSP: 002b:000000c0007178b8 EFLAGS: 00010246 [ 1863.709951] RAX: 000000c0007178d8 RBX: 0000000000000008 RCX: 432a282e636e7973 [ 1863.710531] RDX: 000000000024277d RSI: 0000000000f4a080 RDI: 000000000099c701 [ 1863.711114] RBP: 000000c000717928 R08: 0000000001240aa0 R09: 0000000000f4a13c [ 1863.711699] R10: 0000000000ed0080 R11: 000000000024277f R12: 0000000000000040 [ 1863.712284] R13: 0000000000000040 R14: 0000000000e5dacd R15: 0000000000000000 [ 1863.712928] Mem-Info: [ 1863.713152] active_anon:5356 inactive_anon:67704 isolated_anon:0 [ 1863.713152] active_file:1011 inactive_file:862 isolated_file:0 [ 1863.713152] unevictable:0 dirty:12 writeback:0 [ 1863.713152] slab_reclaimable:7070 slab_unreclaimable:69089 [ 1863.713152] mapped:70692 shmem:121 pagetables:5886 bounce:0 [ 1863.713152] free:4558 free_pcp:477 free_cma:0 [ 1863.715758] Node 0 active_anon:21424kB inactive_anon:270816kB active_file:4044kB inactive_file:3448kB unevictable:0kB isolated(anon):0kB isolated(file):84kB mapped:282768kB dirty:48kB writeback:0kB shmem:484kB writeback_tmp:0kB kernel_stack:8864kB all_unreclaimable? no [ 1863.717678] Node 0 DMA free:6508kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:1208kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1863.719842] lowmem_reserve[]: 0 1616 1616 1616 [ 1863.720244] Node 0 DMA32 free:13236kB min:5116kB low:6768kB high:8420kB reserved_highatomic:2048KB active_anon:21424kB inactive_anon:270028kB active_file:4496kB inactive_file:3692kB unevictable:0kB writepending:132kB present:2080640kB managed:1660484kB mlocked:0kB pagetables:23544kB bounce:0kB free_pcp:472kB local_pcp:420kB free_cma:0kB [ 1863.722673] lowmem_reserve[]: 0 0 0 0 [ 1863.723043] Node 0 DMA: 1*4kB (U) 1*8kB (M) 0*16kB 1*32kB (U) 3*64kB (UM) 1*128kB (U) 2*256kB (UM) 1*512kB (M) 1*1024kB (U) 0*2048kB 1*4096kB (M) = 6508kB [ 1863.724610] Node 0 DMA32: 1148*4kB (UMEH) 500*8kB (UMEH) 237*16kB (UMEH) 25*32kB (UMEH) 1*64kB (M) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 13248kB [ 1863.726366] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1863.727239] 2045 total pagecache pages [ 1863.727657] 0 pages in swap cache [ 1863.727985] Swap cache stats: add 0, delete 0, find 0/0 [ 1863.728621] Free swap = 0kB [ 1863.728893] Total swap = 0kB [ 1863.729257] 524158 pages RAM [ 1863.729529] 0 pages HighMem/MovableOnly [ 1863.730053] 105060 pages reserved [ 1863.730355] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/ssh.service,task=syz-fuzzer,pid=6349,uid=0 [ 1863.732091] Out of memory (oom_kill_allocating_task): Killed process 255 (syz-fuzzer) total-vm:1241344kB, anon-rss:240752kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:912kB oom_score_adj:0 VM DIAGNOSIS: 11:38:32 Registers: info registers vcpu 0 RAX=0000000000000050 RBX=ffff88800f468000 RCX=ffffffff81f35754 RDX=00000000000001f7 RSI=ffffffff81f35762 RDI=0000000000000007 RBP=00000000000101f7 RSP=ffff888019677090 R8 =0000000000000000 R9 =0000000000006d2c R10=0000000000010000 R11=0000000000000001 R12=ffffed1001e8d001 R13=dffffc0000000000 R14=ffffffff8539c780 R15=ffff88800f468008 RIP=ffffffff81f35766 RFL=00000093 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f23cffca900 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f23cff9f8e0 CR3=000000000f002000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ffffffff00ffffffffffffffffffffff XMM01=707465675f6c697475646f6d6d61705f XMM02=ff000000000000ff0000000000ff0000 XMM03=66207463656e6e6f6373696420646576 XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=0d0c0f0e09080b0a0504070601000302 XMM07=00000000000000000000000000000000 XMM08=000a0d732a2e25006c61746166003367 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff8615c652 RBX=ffffffff8685f6b8 RCX=ffffffff812618ea RDX=ffffffff8623b780 RSI=0000000000000004 RDI=000000000000207f RBP=dffffc0000000000 RSP=ffff88801feffbb8 R8 =0000000000000001 R9 =000000000000895b R10=0000000000000000 R11=0000000000000001 R12=0000000000000602 R13=0000000000008957 R14=ffffffff8615c656 R15=ffffffff8623b780 RIP=ffffffff812614de RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f62b49e6003 CR3=000000001dd46000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=0000000000000000000000000000ffff XMM02=f6f61900007f62b4f03c71000000725f XMM03=00000000007f62b4f03c71000000725f XMM04=00007f62b4f6f61900007f62b4f6f619 XMM05=5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a XMM06=20202020202020202020202020202020 XMM07=00000000000000000000000000000000 XMM08=202020202020203a70756f726774656e XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000