/0x360 [ 2043.083535] ? remove_inode_buffers+0x300/0x300 [ 2043.084468] ? pagecache_get_page+0x243/0xc80 [ 2043.085370] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2043.086443] ? wait_for_stable_page+0x92/0xe0 [ 2043.087364] cont_write_begin+0x472/0x980 [ 2043.088202] ? fat_add_cluster+0x100/0x100 [ 2043.089047] ? nobh_write_begin+0xed0/0xed0 [ 2043.089905] ? __mark_inode_dirty+0x93b/0xd40 [ 2043.090809] ? lock_downgrade+0x6d0/0x6d0 [ 2043.091635] ? do_raw_spin_lock+0x121/0x260 [ 2043.092491] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2043.093501] ? rwlock_bug.part.0+0x90/0x90 [ 2043.094345] fat_write_begin+0x89/0x180 [ 2043.095173] ? fat_add_cluster+0x100/0x100 [ 2043.096028] generic_perform_write+0x20a/0x4f0 [ 2043.096960] ? fat_direct_IO+0x1ef/0x380 [ 2043.097774] ? page_cache_next_miss+0x310/0x310 [ 2043.098731] __generic_file_write_iter+0x2cd/0x5d0 [ 2043.099715] generic_file_write_iter+0xdb/0x230 [ 2043.100648] do_iter_readv_writev+0x476/0x750 [ 2043.101545] ? new_sync_write+0x660/0x660 [ 2043.102371] ? selinux_file_permission+0x92/0x520 [ 2043.103361] do_iter_write+0x191/0x670 [ 2043.104140] ? trace_hardirqs_on+0x5b/0x180 [ 2043.105009] vfs_iter_write+0x70/0xa0 [ 2043.105775] iter_file_splice_write+0x762/0xc30 [ 2043.106735] ? generic_splice_sendpage+0x140/0x140 [ 2043.107720] ? avc_policy_seqno+0x9/0x70 [ 2043.108526] ? selinux_file_permission+0x92/0x520 [ 2043.109488] ? lockdep_init_map_type+0x2c7/0x780 [ 2043.110431] ? generic_splice_sendpage+0x140/0x140 [ 2043.111417] direct_splice_actor+0x10f/0x170 [ 2043.112299] splice_direct_to_actor+0x387/0x980 [ 2043.113232] ? pipe_to_sendpage+0x380/0x380 [ 2043.114096] ? do_splice_to+0x160/0x160 [ 2043.114909] ? security_file_permission+0x24e/0x570 [ 2043.115911] do_splice_direct+0x1c4/0x290 [ 2043.116740] ? splice_direct_to_actor+0x980/0x980 [ 2043.117695] ? selinux_file_permission+0x92/0x520 [ 2043.118673] ? security_file_permission+0x24e/0x570 [ 2043.119677] do_sendfile+0x553/0x1090 [ 2043.120448] ? do_pwritev+0x270/0x270 [ 2043.121214] ? wait_for_completion_io+0x270/0x270 [ 2043.122179] ? rcu_read_lock_any_held+0x75/0xa0 [ 2043.123112] ? vfs_write+0x354/0xa70 [ 2043.123863] __x64_sys_sendfile64+0x1d1/0x210 [ 2043.124760] ? __ia32_sys_sendfile+0x220/0x220 [ 2043.125685] do_syscall_64+0x33/0x40 [ 2043.126429] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2043.127468] RIP: 0033:0x7f305db86b19 [ 2043.128209] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2043.131871] RSP: 002b:00007f305b0fc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2043.133384] RAX: ffffffffffffffda RBX: 00007f305dc99f60 RCX: 00007f305db86b19 [ 2043.134820] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2043.136231] RBP: 00007f305b0fc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2043.137649] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2043.139069] R13: 00007ffd4f1a5fcf R14: 00007f305b0fc300 R15: 0000000000022000 [ 2043.140591] CPU: 1 PID: 12575 Comm: syz-executor.7 Not tainted 5.10.194 #1 [ 2043.142016] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2043.143739] Call Trace: [ 2043.144319] dump_stack+0x107/0x167 [ 2043.145072] should_fail.cold+0x5/0xa [ 2043.145873] _copy_from_user+0x2e/0x1b0 [ 2043.146943] __copy_msghdr_from_user+0x91/0x4b0 [ 2043.147886] ? __ia32_sys_shutdown+0x80/0x80 [ 2043.148789] ? __lock_acquire+0x1657/0x5b00 [ 2043.149884] ___sys_recvmsg+0xd5/0x200 [ 2043.150693] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 2043.151860] ? lock_downgrade+0x6d0/0x6d0 [ 2043.152806] ? lock_acquire+0x197/0x470 [ 2043.153614] ? find_held_lock+0x2c/0x110 [ 2043.154439] ? __might_fault+0xd3/0x180 [ 2043.155318] ? lock_downgrade+0x6d0/0x6d0 [ 2043.156239] do_recvmmsg+0x24c/0x6d0 [ 2043.157010] ? ___sys_recvmsg+0x200/0x200 [ 2043.157863] ? lock_downgrade+0x6d0/0x6d0 [ 2043.158737] ? ksys_write+0x12d/0x260 [ 2043.159650] ? wait_for_completion_io+0x270/0x270 [ 2043.160741] ? rcu_read_lock_any_held+0x75/0xa0 [ 2043.161816] ? vfs_write+0x354/0xa70 [ 2043.162629] __x64_sys_recvmmsg+0x20f/0x260 [ 2043.163505] ? ksys_write+0x1a9/0x260 [ 2043.164279] ? __do_sys_socketcall+0x600/0x600 [ 2043.165280] do_syscall_64+0x33/0x40 [ 2043.166073] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2043.167132] RIP: 0033:0x7f6a13980b19 [ 2043.167895] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2043.171953] RSP: 002b:00007f6a10ef6188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 2043.173584] RAX: ffffffffffffffda RBX: 00007f6a13a93f60 RCX: 00007f6a13980b19 [ 2043.175153] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000007 [ 2043.176786] RBP: 00007f6a10ef61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2043.178321] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000002 [ 2043.179772] R13: 00007ffe4c7e847f R14: 00007f6a10ef6300 R15: 0000000000022000 [ 2043.241793] FAULT_INJECTION: forcing a failure. [ 2043.241793] name failslab, interval 1, probability 0, space 0, times 0 [ 2043.244602] CPU: 0 PID: 12556 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2043.245985] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2043.247650] Call Trace: [ 2043.248186] dump_stack+0x107/0x167 [ 2043.248920] should_fail.cold+0x5/0xa [ 2043.249704] ? fat_cache_add.part.0+0x3c6/0x5d0 [ 2043.250662] should_failslab+0x5/0x20 [ 2043.251421] kmem_cache_alloc+0x5b/0x310 [ 2043.252276] fat_cache_add.part.0+0x3c6/0x5d0 [ 2043.253178] fat_get_cluster+0x91e/0xd40 [ 2043.254003] ? fat_cache_inval_inode+0x290/0x290 [ 2043.254983] fat_get_mapped_cluster+0x212/0x440 [ 2043.255917] ? fat_get_cluster+0xd40/0xd40 [ 2043.256778] fat_bmap+0x1f8/0x460 [ 2043.257479] fat_get_block+0x33a/0x940 [ 2043.258264] ? fat_add_cluster+0x100/0x100 [ 2043.259115] ? create_empty_buffers+0x4a3/0x640 [ 2043.260055] ? create_page_buffers+0x139/0x230 [ 2043.260971] __block_write_begin_int+0x3d1/0x19c0 [ 2043.261936] ? fat_add_cluster+0x100/0x100 [ 2043.262812] ? lock_chain_count+0x20/0x20 [ 2043.263638] ? remove_inode_buffers+0x300/0x300 [ 2043.264563] ? pagecache_get_page+0x243/0xc80 [ 2043.265463] ? wait_for_stable_page+0x92/0xe0 [ 2043.266354] cont_write_begin+0x472/0x980 [ 2043.267191] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2043.268238] ? fat_add_cluster+0x100/0x100 [ 2043.269100] ? nobh_write_begin+0xed0/0xed0 [ 2043.269965] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2043.271035] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2043.272113] ? trace_hardirqs_on+0x5b/0x180 [ 2043.272983] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2043.274072] fat_write_begin+0x89/0x180 [ 2043.274875] ? fat_add_cluster+0x100/0x100 [ 2043.275723] generic_perform_write+0x20a/0x4f0 [ 2043.276649] ? fat_direct_IO+0x1ef/0x380 [ 2043.277472] ? page_cache_next_miss+0x310/0x310 [ 2043.278415] __generic_file_write_iter+0x2cd/0x5d0 [ 2043.279419] generic_file_write_iter+0xdb/0x230 [ 2043.280361] do_iter_readv_writev+0x476/0x750 [ 2043.281269] ? new_sync_write+0x660/0x660 [ 2043.282101] ? selinux_file_permission+0x92/0x520 [ 2043.283096] do_iter_write+0x191/0x670 [ 2043.283885] ? trace_hardirqs_on+0x5b/0x180 [ 2043.284759] vfs_iter_write+0x70/0xa0 [ 2043.285527] iter_file_splice_write+0x762/0xc30 [ 2043.286476] ? generic_splice_sendpage+0x140/0x140 [ 2043.287527] ? avc_policy_seqno+0x9/0x70 [ 2043.288340] ? selinux_file_permission+0x92/0x520 [ 2043.289320] ? lockdep_init_map_type+0x2c7/0x780 [ 2043.290273] ? generic_splice_sendpage+0x140/0x140 [ 2043.291280] direct_splice_actor+0x10f/0x170 [ 2043.292165] splice_direct_to_actor+0x387/0x980 [ 2043.293111] ? pipe_to_sendpage+0x380/0x380 [ 2043.293975] ? do_splice_to+0x160/0x160 [ 2043.294790] ? security_file_permission+0x24e/0x570 [ 2043.295802] do_splice_direct+0x1c4/0x290 [ 2043.296650] ? splice_direct_to_actor+0x980/0x980 [ 2043.297625] ? selinux_file_permission+0x92/0x520 [ 2043.298624] ? security_file_permission+0x24e/0x570 [ 2043.299642] do_sendfile+0x553/0x1090 [ 2043.300429] ? do_pwritev+0x270/0x270 [ 2043.301211] ? wait_for_completion_io+0x270/0x270 [ 2043.302207] ? rcu_read_lock_any_held+0x75/0xa0 [ 2043.303156] ? vfs_write+0x354/0xa70 [ 2043.303921] __x64_sys_sendfile64+0x1d1/0x210 [ 2043.304839] ? __ia32_sys_sendfile+0x220/0x220 [ 2043.305777] do_syscall_64+0x33/0x40 [ 2043.306530] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2043.307582] RIP: 0033:0x7f100819db19 [ 2043.308340] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2043.312063] RSP: 002b:00007f1005713188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2043.313610] RAX: ffffffffffffffda RBX: 00007f10082b0f60 RCX: 00007f100819db19 [ 2043.315073] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2043.316517] RBP: 00007f10057131d0 R08: 0000000000000000 R09: 0000000000000000 [ 2043.317964] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 2043.319442] R13: 00007ffeacf3256f R14: 00007f1005713300 R15: 0000000000022000 18:42:04 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x500, 0x20000022, 0x0) (fail_nth: 86) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:42:04 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:42:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000007) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) [ 2043.598429] FAULT_INJECTION: forcing a failure. [ 2043.598429] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2043.601088] CPU: 0 PID: 12584 Comm: syz-executor.7 Not tainted 5.10.194 #1 [ 2043.602488] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2043.604181] Call Trace: [ 2043.604725] dump_stack+0x107/0x167 [ 2043.605462] should_fail.cold+0x5/0xa [ 2043.606234] _copy_from_user+0x2e/0x1b0 [ 2043.607052] __copy_msghdr_from_user+0x91/0x4b0 [ 2043.607991] ? __ia32_sys_shutdown+0x80/0x80 [ 2043.608879] ? __lock_acquire+0x1657/0x5b00 [ 2043.609762] ___sys_recvmsg+0xd5/0x200 [ 2043.610566] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 2043.611560] ? _raw_spin_unlock_irq+0x27/0x30 [ 2043.612474] ? lock_acquire+0x197/0x470 [ 2043.613273] ? find_held_lock+0x2c/0x110 [ 2043.614095] ? __might_fault+0xd3/0x180 [ 2043.614910] ? lock_downgrade+0x6d0/0x6d0 [ 2043.615743] ? io_schedule_timeout+0x140/0x140 [ 2043.616678] do_recvmmsg+0x24c/0x6d0 [ 2043.617432] ? ___sys_recvmsg+0x200/0x200 [ 2043.618265] ? lock_downgrade+0x6d0/0x6d0 [ 2043.619114] ? ksys_write+0x12d/0x260 [ 2043.619900] ? wait_for_completion_io+0x270/0x270 [ 2043.620870] ? rcu_read_lock_any_held+0x75/0xa0 [ 2043.621805] ? vfs_write+0x354/0xa70 [ 2043.622580] __x64_sys_recvmmsg+0x20f/0x260 [ 2043.623444] ? ksys_write+0x1a9/0x260 [ 2043.624210] ? __do_sys_socketcall+0x600/0x600 [ 2043.625137] do_syscall_64+0x33/0x40 [ 2043.625889] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2043.626925] RIP: 0033:0x7f6a13980b19 [ 2043.627676] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2043.631363] RSP: 002b:00007f6a10ef6188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 2043.632890] RAX: ffffffffffffffda RBX: 00007f6a13a93f60 RCX: 00007f6a13980b19 [ 2043.634319] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000007 [ 2043.635795] RBP: 00007f6a10ef61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2043.637250] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000002 [ 2043.638690] R13: 00007ffe4c7e847f R14: 00007f6a10ef6300 R15: 0000000000022000 18:42:04 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000003) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:42:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={r2, "b76a24f24ac24227549f48ce1baee3b2"}) 18:42:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:42:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:42:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:42:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000002) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:42:18 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x500, 0x20000022, 0x0) (fail_nth: 87) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:42:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000008) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:42:18 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:42:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:42:18 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000004) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:42:18 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, 0x0) 18:42:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000002) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) [ 2057.179149] FAULT_INJECTION: forcing a failure. [ 2057.179149] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2057.180679] CPU: 0 PID: 12631 Comm: syz-executor.7 Not tainted 5.10.194 #1 [ 2057.181445] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2057.182339] Call Trace: [ 2057.182647] dump_stack+0x107/0x167 [ 2057.183071] should_fail.cold+0x5/0xa [ 2057.183505] _copy_from_user+0x2e/0x1b0 [ 2057.183947] __copy_msghdr_from_user+0x91/0x4b0 [ 2057.184465] ? __ia32_sys_shutdown+0x80/0x80 [ 2057.184964] ? __lock_acquire+0x1657/0x5b00 [ 2057.185453] ___sys_recvmsg+0xd5/0x200 [ 2057.185887] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 2057.186425] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2057.186997] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2057.187492] ? trace_hardirqs_on+0x5b/0x180 [ 2057.187962] ? lock_acquire+0x197/0x470 [ 2057.188405] ? find_held_lock+0x2c/0x110 [ 2057.188865] ? __might_fault+0xd3/0x180 [ 2057.189310] ? lock_downgrade+0x6d0/0x6d0 [ 2057.189766] ? io_schedule_timeout+0x140/0x140 [ 2057.190280] do_recvmmsg+0x24c/0x6d0 [ 2057.190698] ? ___sys_recvmsg+0x200/0x200 [ 2057.191174] ? lock_downgrade+0x6d0/0x6d0 [ 2057.191629] ? ksys_write+0x12d/0x260 [ 2057.192054] ? wait_for_completion_io+0x270/0x270 [ 2057.192593] ? rcu_read_lock_any_held+0x75/0xa0 [ 2057.193107] ? vfs_write+0x354/0xa70 [ 2057.193522] __x64_sys_recvmmsg+0x20f/0x260 [ 2057.193996] ? ksys_write+0x1a9/0x260 [ 2057.194410] ? __do_sys_socketcall+0x600/0x600 [ 2057.194929] do_syscall_64+0x33/0x40 [ 2057.195346] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2057.195905] RIP: 0033:0x7f6a13980b19 [ 2057.196318] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2057.198340] RSP: 002b:00007f6a10ef6188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 2057.199194] RAX: ffffffffffffffda RBX: 00007f6a13a93f60 RCX: 00007f6a13980b19 [ 2057.199955] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000007 [ 2057.200741] RBP: 00007f6a10ef61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2057.201520] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000002 [ 2057.202289] R13: 00007ffe4c7e847f R14: 00007f6a10ef6300 R15: 0000000000022000 18:42:18 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x500, 0x20000022, 0x0) (fail_nth: 88) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) [ 2057.415340] FAULT_INJECTION: forcing a failure. [ 2057.415340] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2057.418311] CPU: 1 PID: 12649 Comm: syz-executor.7 Not tainted 5.10.194 #1 [ 2057.419852] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2057.421675] Call Trace: [ 2057.422263] dump_stack+0x107/0x167 [ 2057.423115] should_fail.cold+0x5/0xa [ 2057.423937] _copy_from_user+0x2e/0x1b0 [ 2057.424826] __copy_msghdr_from_user+0x91/0x4b0 [ 2057.425849] ? __ia32_sys_shutdown+0x80/0x80 [ 2057.426839] ? __lock_acquire+0x1657/0x5b00 [ 2057.427799] ___sys_recvmsg+0xd5/0x200 [ 2057.428652] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 2057.429742] ? lock_downgrade+0x6d0/0x6d0 [ 2057.430599] ? lock_acquire+0x197/0x470 [ 2057.431517] ? find_held_lock+0x2c/0x110 [ 2057.432420] ? __might_fault+0xd3/0x180 [ 2057.433306] ? lock_downgrade+0x6d0/0x6d0 [ 2057.434237] do_recvmmsg+0x24c/0x6d0 [ 2057.435107] ? ___sys_recvmsg+0x200/0x200 [ 2057.436005] ? lock_downgrade+0x6d0/0x6d0 [ 2057.436930] ? ksys_write+0x12d/0x260 [ 2057.437802] ? wait_for_completion_io+0x270/0x270 [ 2057.438903] ? rcu_read_lock_any_held+0x75/0xa0 [ 2057.439937] ? vfs_write+0x354/0xa70 [ 2057.440790] __x64_sys_recvmmsg+0x20f/0x260 [ 2057.441686] ? ksys_write+0x1a9/0x260 [ 2057.442558] ? __do_sys_socketcall+0x600/0x600 [ 2057.443617] do_syscall_64+0x33/0x40 [ 2057.444475] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2057.445631] RIP: 0033:0x7f6a13980b19 [ 2057.446474] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2057.450662] RSP: 002b:00007f6a10ef6188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 2057.452407] RAX: ffffffffffffffda RBX: 00007f6a13a93f60 RCX: 00007f6a13980b19 [ 2057.453961] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000007 [ 2057.455606] RBP: 00007f6a10ef61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2057.457230] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000002 [ 2057.458883] R13: 00007ffe4c7e847f R14: 00007f6a10ef6300 R15: 0000000000022000 18:42:31 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000005) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:42:31 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x500, 0x20000022, 0x0) (fail_nth: 89) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:42:31 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000009) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:42:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:42:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000003) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:42:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:42:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, 0x0) 18:42:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000003) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) [ 2070.579299] FAULT_INJECTION: forcing a failure. [ 2070.579299] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2070.582016] CPU: 1 PID: 12682 Comm: syz-executor.7 Not tainted 5.10.194 #1 [ 2070.583443] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2070.585131] Call Trace: [ 2070.585679] dump_stack+0x107/0x167 [ 2070.586427] should_fail.cold+0x5/0xa [ 2070.587223] _copy_from_user+0x2e/0x1b0 [ 2070.588043] __copy_msghdr_from_user+0x91/0x4b0 [ 2070.588988] ? __ia32_sys_shutdown+0x80/0x80 [ 2070.589884] ? __lock_acquire+0x1657/0x5b00 [ 2070.590774] ___sys_recvmsg+0xd5/0x200 [ 2070.591582] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 2070.592578] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2070.593679] ? lock_acquire+0x197/0x470 [ 2070.594490] ? find_held_lock+0x2c/0x110 [ 2070.595328] ? __might_fault+0xd3/0x180 [ 2070.596130] ? lock_downgrade+0x6d0/0x6d0 [ 2070.596971] ? io_schedule_timeout+0x140/0x140 [ 2070.597908] do_recvmmsg+0x24c/0x6d0 [ 2070.598667] ? ___sys_recvmsg+0x200/0x200 [ 2070.599510] ? lock_downgrade+0x6d0/0x6d0 [ 2070.600353] ? ksys_write+0x12d/0x260 [ 2070.601130] ? wait_for_completion_io+0x270/0x270 [ 2070.602107] ? rcu_read_lock_any_held+0x75/0xa0 [ 2070.603076] ? vfs_write+0x354/0xa70 [ 2070.603833] __x64_sys_recvmmsg+0x20f/0x260 [ 2070.604706] ? ksys_write+0x1a9/0x260 [ 2070.605473] ? __do_sys_socketcall+0x600/0x600 [ 2070.606410] do_syscall_64+0x33/0x40 [ 2070.607176] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2070.608207] RIP: 0033:0x7f6a13980b19 [ 2070.608957] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2070.612675] RSP: 002b:00007f6a10ef6188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 2070.614208] RAX: ffffffffffffffda RBX: 00007f6a13a93f60 RCX: 00007f6a13980b19 [ 2070.615667] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000007 [ 2070.617117] RBP: 00007f6a10ef61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2070.618584] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000002 [ 2070.620050] R13: 00007ffe4c7e847f R14: 00007f6a10ef6300 R15: 0000000000022000 18:42:31 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x500, 0x20000022, 0x0) (fail_nth: 90) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) [ 2070.822034] FAULT_INJECTION: forcing a failure. [ 2070.822034] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2070.824893] CPU: 1 PID: 12704 Comm: syz-executor.7 Not tainted 5.10.194 #1 [ 2070.826366] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2070.828248] Call Trace: [ 2070.828837] dump_stack+0x107/0x167 [ 2070.829644] should_fail.cold+0x5/0xa [ 2070.830460] _copy_from_user+0x2e/0x1b0 [ 2070.831282] __copy_msghdr_from_user+0x91/0x4b0 [ 2070.832216] ? __ia32_sys_shutdown+0x80/0x80 [ 2070.833111] ? __lock_acquire+0x1657/0x5b00 [ 2070.834187] ___sys_recvmsg+0xd5/0x200 [ 2070.835221] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 2070.836495] ? lock_downgrade+0x6d0/0x6d0 [ 2070.837561] ? lock_acquire+0x197/0x470 [ 2070.838580] ? find_held_lock+0x2c/0x110 [ 2070.839733] ? __might_fault+0xd3/0x180 [ 2070.840752] ? lock_downgrade+0x6d0/0x6d0 [ 2070.841838] do_recvmmsg+0x24c/0x6d0 [ 2070.842956] ? ___sys_recvmsg+0x200/0x200 [ 2070.844053] ? lock_downgrade+0x6d0/0x6d0 [ 2070.845181] ? ksys_write+0x12d/0x260 [ 2070.846167] ? wait_for_completion_io+0x270/0x270 [ 2070.847426] ? rcu_read_lock_any_held+0x75/0xa0 [ 2070.848609] ? vfs_write+0x354/0xa70 [ 2070.849589] __x64_sys_recvmmsg+0x20f/0x260 [ 2070.850765] ? ksys_write+0x1a9/0x260 [ 2070.851834] ? __do_sys_socketcall+0x600/0x600 [ 2070.853051] do_syscall_64+0x33/0x40 [ 2070.853977] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2070.855287] RIP: 0033:0x7f6a13980b19 [ 2070.856239] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2070.860693] RSP: 002b:00007f6a10ef6188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 2070.862337] RAX: ffffffffffffffda RBX: 00007f6a13a93f60 RCX: 00007f6a13980b19 [ 2070.863855] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000007 [ 2070.865388] RBP: 00007f6a10ef61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2070.866871] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000002 [ 2070.868455] R13: 00007ffe4c7e847f R14: 00007f6a10ef6300 R15: 0000000000022000 18:42:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000004) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:42:32 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x500, 0x20000022, 0x0) (fail_nth: 91) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:42:32 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000006) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:42:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) [ 2071.216811] FAULT_INJECTION: forcing a failure. [ 2071.216811] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2071.219463] CPU: 1 PID: 12715 Comm: syz-executor.7 Not tainted 5.10.194 #1 [ 2071.220874] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2071.222555] Call Trace: [ 2071.223118] dump_stack+0x107/0x167 [ 2071.223869] should_fail.cold+0x5/0xa [ 2071.224643] _copy_from_user+0x2e/0x1b0 [ 2071.225453] __copy_msghdr_from_user+0x91/0x4b0 [ 2071.226415] ? __ia32_sys_shutdown+0x80/0x80 [ 2071.227331] ? __lock_acquire+0x1657/0x5b00 [ 2071.228235] ___sys_recvmsg+0xd5/0x200 [ 2071.229040] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 2071.230054] ? lock_acquire+0x197/0x470 [ 2071.230862] ? find_held_lock+0x2c/0x110 [ 2071.231727] ? __might_fault+0xd3/0x180 [ 2071.232528] ? lock_downgrade+0x6d0/0x6d0 [ 2071.233394] do_recvmmsg+0x24c/0x6d0 [ 2071.234155] ? ___sys_recvmsg+0x200/0x200 [ 2071.235012] ? lock_downgrade+0x6d0/0x6d0 [ 2071.235856] ? ksys_write+0x12d/0x260 [ 2071.236653] ? wait_for_completion_io+0x270/0x270 [ 2071.237622] ? rcu_read_lock_any_held+0x75/0xa0 [ 2071.238576] ? vfs_write+0x354/0xa70 [ 2071.239339] __x64_sys_recvmmsg+0x20f/0x260 [ 2071.240225] ? ksys_write+0x1a9/0x260 [ 2071.241004] ? __do_sys_socketcall+0x600/0x600 [ 2071.241948] do_syscall_64+0x33/0x40 [ 2071.242709] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2071.243775] RIP: 0033:0x7f6a13980b19 [ 2071.244536] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2071.248278] RSP: 002b:00007f6a10ef6188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 2071.249836] RAX: ffffffffffffffda RBX: 00007f6a13a93f60 RCX: 00007f6a13980b19 [ 2071.251307] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000007 [ 2071.252780] RBP: 00007f6a10ef61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2071.254237] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000002 [ 2071.255703] R13: 00007ffe4c7e847f R14: 00007f6a10ef6300 R15: 0000000000022000 18:42:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000000a) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:42:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:42:32 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, 0x0) 18:42:32 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x500, 0x20000022, 0x0) (fail_nth: 92) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:42:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000004) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) [ 2071.495621] FAULT_INJECTION: forcing a failure. [ 2071.495621] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2071.498720] CPU: 1 PID: 12735 Comm: syz-executor.7 Not tainted 5.10.194 #1 [ 2071.500384] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2071.502219] Call Trace: [ 2071.502788] dump_stack+0x107/0x167 [ 2071.503642] should_fail.cold+0x5/0xa [ 2071.504754] _copy_from_user+0x2e/0x1b0 [ 2071.505747] __copy_msghdr_from_user+0x91/0x4b0 [ 2071.507043] ? __ia32_sys_shutdown+0x80/0x80 [ 2071.508242] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2071.509327] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2071.510499] ? trace_hardirqs_on+0x5b/0x180 [ 2071.511462] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2071.512795] ___sys_recvmsg+0xd5/0x200 [ 2071.513581] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 2071.514693] ? _raw_spin_unlock_irq+0x27/0x30 [ 2071.515728] ? finish_task_switch+0x126/0x5d0 [ 2071.516855] ? finish_task_switch+0xef/0x5d0 [ 2071.517765] ? __switch_to+0x572/0xf70 [ 2071.518627] ? __switch_to_asm+0x3a/0x60 [ 2071.519566] ? __switch_to_asm+0x34/0x60 [ 2071.520602] ? __schedule+0x82c/0x1ea0 [ 2071.521398] ? io_schedule_timeout+0x140/0x140 [ 2071.522453] do_recvmmsg+0x24c/0x6d0 [ 2071.523318] ? ___sys_recvmsg+0x200/0x200 [ 2071.524341] ? lock_downgrade+0x6d0/0x6d0 [ 2071.525233] ? ksys_write+0x12d/0x260 [ 2071.526111] ? wait_for_completion_io+0x270/0x270 [ 2071.527178] ? rcu_read_lock_any_held+0x75/0xa0 [ 2071.528310] ? vfs_write+0x354/0xa70 [ 2071.529120] __x64_sys_recvmmsg+0x20f/0x260 [ 2071.530094] ? ksys_write+0x1a9/0x260 [ 2071.530967] ? __do_sys_socketcall+0x600/0x600 [ 2071.532087] do_syscall_64+0x33/0x40 [ 2071.532900] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2071.534076] RIP: 0033:0x7f6a13980b19 [ 2071.534947] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2071.539115] RSP: 002b:00007f6a10ef6188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 2071.540840] RAX: ffffffffffffffda RBX: 00007f6a13a93f60 RCX: 00007f6a13980b19 [ 2071.542426] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000007 [ 2071.544122] RBP: 00007f6a10ef61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2071.545647] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000002 [ 2071.547300] R13: 00007ffe4c7e847f R14: 00007f6a10ef6300 R15: 0000000000022000 18:42:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000005) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:42:46 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x500, 0x20000022, 0x0) (fail_nth: 93) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:42:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000005) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:42:46 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:42:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000000b) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:42:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:42:46 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000007) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:42:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) [ 2084.897877] FAULT_INJECTION: forcing a failure. [ 2084.897877] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2084.900391] CPU: 0 PID: 12764 Comm: syz-executor.7 Not tainted 5.10.194 #1 [ 2084.901759] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2084.903396] Call Trace: [ 2084.903932] dump_stack+0x107/0x167 [ 2084.904654] should_fail.cold+0x5/0xa [ 2084.905413] _copy_from_user+0x2e/0x1b0 [ 2084.906218] __copy_msghdr_from_user+0x91/0x4b0 [ 2084.907177] ? __ia32_sys_shutdown+0x80/0x80 [ 2084.908065] ? __lock_acquire+0x1657/0x5b00 [ 2084.908957] ___sys_recvmsg+0xd5/0x200 [ 2084.909747] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 2084.910752] ? lock_acquire+0x197/0x470 [ 2084.911576] ? find_held_lock+0x2c/0x110 [ 2084.912403] ? __might_fault+0xd3/0x180 [ 2084.913211] ? lock_downgrade+0x6d0/0x6d0 [ 2084.914071] do_recvmmsg+0x24c/0x6d0 [ 2084.914839] ? ___sys_recvmsg+0x200/0x200 [ 2084.915696] ? lock_downgrade+0x6d0/0x6d0 [ 2084.916555] ? ksys_write+0x12d/0x260 [ 2084.917340] ? wait_for_completion_io+0x270/0x270 [ 2084.918321] ? rcu_read_lock_any_held+0x75/0xa0 [ 2084.919283] ? vfs_write+0x354/0xa70 [ 2084.920045] __x64_sys_recvmmsg+0x20f/0x260 [ 2084.920936] ? ksys_write+0x1a9/0x260 [ 2084.921721] ? __do_sys_socketcall+0x600/0x600 [ 2084.922657] do_syscall_64+0x33/0x40 [ 2084.923432] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2084.924468] RIP: 0033:0x7f6a13980b19 [ 2084.925230] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2084.928982] RSP: 002b:00007f6a10ef6188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 2084.930542] RAX: ffffffffffffffda RBX: 00007f6a13a93f60 RCX: 00007f6a13980b19 [ 2084.932018] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000007 [ 2084.933477] RBP: 00007f6a10ef61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2084.934954] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000002 [ 2084.936416] R13: 00007ffe4c7e847f R14: 00007f6a10ef6300 R15: 0000000000022000 18:42:46 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x500, 0x20000022, 0x0) (fail_nth: 94) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:42:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) [ 2085.344645] FAULT_INJECTION: forcing a failure. [ 2085.344645] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2085.347179] CPU: 0 PID: 12783 Comm: syz-executor.7 Not tainted 5.10.194 #1 [ 2085.348550] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2085.350192] Call Trace: [ 2085.350726] dump_stack+0x107/0x167 [ 2085.351482] should_fail.cold+0x5/0xa [ 2085.352248] __alloc_pages_nodemask+0x182/0x600 [ 2085.353171] ? lock_chain_count+0x20/0x20 [ 2085.353997] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2085.355257] alloc_pages_vma+0xbb/0x410 [ 2085.356051] wp_page_copy+0xee7/0x1f00 [ 2085.356841] ? print_bad_pte+0x5a0/0x5a0 [ 2085.357645] ? lock_downgrade+0x6d0/0x6d0 [ 2085.358487] ? vm_normal_page+0x162/0x2e0 [ 2085.359336] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2085.360390] do_wp_page+0x27b/0x1390 [ 2085.361137] handle_mm_fault+0x1cc7/0x3500 [ 2085.361994] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2085.362985] ? __pmd_alloc+0x5e0/0x5e0 [ 2085.363775] ? vmacache_find+0x55/0x2a0 [ 2085.364578] do_user_addr_fault+0x56e/0xc60 [ 2085.365449] exc_page_fault+0xa2/0x1a0 [ 2085.366229] asm_exc_page_fault+0x1e/0x30 [ 2085.367056] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 2085.368109] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca e9 81 59 1e 02 90 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca e9 62 59 1e 02 66 90 48 bb f9 ef ff ff ff 7f [ 2085.371791] RSP: 0018:ffff88801ad779c8 EFLAGS: 00050246 [ 2085.372851] RAX: 0000000000000000 RBX: ffffffff8362e620 RCX: 0000000020009030 [ 2085.374267] RDX: 1ffff110035aefc3 RSI: ffffffff830ee1ba RDI: 0000000000000005 [ 2085.375693] RBP: ffff88801ad77dc8 R08: 0000000000000001 R09: ffff88800ebe6d07 [ 2085.377109] R10: 0000000000000000 R11: 0000000000000001 R12: 0000000020009030 [ 2085.378511] R13: 0000000020009000 R14: 0000000020000022 R15: 0000000000000000 [ 2085.379948] ? unix_dgram_recvmsg+0xb70/0xb70 [ 2085.380845] ? ____sys_recvmsg+0x2aa/0x590 [ 2085.381695] ____sys_recvmsg+0x2dd/0x590 [ 2085.382509] ? kernel_recvmsg+0x80/0x80 [ 2085.383310] ? __import_iovec+0x458/0x590 [ 2085.384144] ? import_iovec+0x83/0xb0 [ 2085.384908] ___sys_recvmsg+0x127/0x200 [ 2085.385695] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 2085.386714] ? lock_acquire+0x197/0x470 [ 2085.387535] ? find_held_lock+0x2c/0x110 [ 2085.388364] ? __might_fault+0xd3/0x180 [ 2085.389186] ? lock_downgrade+0x6d0/0x6d0 [ 2085.390060] do_recvmmsg+0x24c/0x6d0 [ 2085.390823] ? ___sys_recvmsg+0x200/0x200 [ 2085.391684] ? lock_downgrade+0x6d0/0x6d0 [ 2085.392540] ? ksys_write+0x12d/0x260 [ 2085.393334] ? wait_for_completion_io+0x270/0x270 [ 2085.394323] ? rcu_read_lock_any_held+0x75/0xa0 [ 2085.395291] ? vfs_write+0x354/0xa70 [ 2085.396065] __x64_sys_recvmmsg+0x20f/0x260 [ 2085.396948] ? ksys_write+0x1a9/0x260 [ 2085.397726] ? __do_sys_socketcall+0x600/0x600 [ 2085.398669] do_syscall_64+0x33/0x40 [ 2085.399443] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2085.400489] RIP: 0033:0x7f6a13980b19 [ 2085.401248] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2085.404998] RSP: 002b:00007f6a10ef6188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 2085.406545] RAX: ffffffffffffffda RBX: 00007f6a13a93f60 RCX: 00007f6a13980b19 [ 2085.408018] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000007 [ 2085.409480] RBP: 00007f6a10ef61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2085.410929] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000002 [ 2085.412392] R13: 00007ffe4c7e847f R14: 00007f6a10ef6300 R15: 0000000000022000 18:42:46 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000008) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:42:46 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x500, 0x20000022, 0x0) (fail_nth: 95) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) [ 2085.690047] FAULT_INJECTION: forcing a failure. [ 2085.690047] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2085.693122] CPU: 0 PID: 12793 Comm: syz-executor.7 Not tainted 5.10.194 #1 [ 2085.694619] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2085.696313] Call Trace: [ 2085.696862] dump_stack+0x107/0x167 [ 2085.697611] should_fail.cold+0x5/0xa [ 2085.698401] _copy_from_user+0x2e/0x1b0 [ 2085.699225] __copy_msghdr_from_user+0x91/0x4b0 [ 2085.700174] ? __ia32_sys_shutdown+0x80/0x80 [ 2085.701077] ? __lock_acquire+0x1657/0x5b00 [ 2085.701968] ___sys_recvmsg+0xd5/0x200 [ 2085.702762] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 2085.703787] ? lock_acquire+0x197/0x470 [ 2085.704596] ? find_held_lock+0x2c/0x110 [ 2085.705439] ? __might_fault+0xd3/0x180 [ 2085.706251] ? lock_downgrade+0x6d0/0x6d0 [ 2085.707122] do_recvmmsg+0x24c/0x6d0 [ 2085.707888] ? ___sys_recvmsg+0x200/0x200 [ 2085.708741] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2085.709656] ? _raw_spin_unlock_irq+0x27/0x30 [ 2085.710568] ? finish_task_switch+0x126/0x5d0 [ 2085.711502] ? finish_task_switch+0xef/0x5d0 [ 2085.712417] __x64_sys_recvmmsg+0x20f/0x260 [ 2085.713293] ? ksys_write+0x1a9/0x260 [ 2085.714071] ? __do_sys_socketcall+0x600/0x600 [ 2085.715012] do_syscall_64+0x33/0x40 [ 2085.715781] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2085.716821] RIP: 0033:0x7f6a13980b19 [ 2085.717580] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2085.721321] RSP: 002b:00007f6a10ef6188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 2085.722864] RAX: ffffffffffffffda RBX: 00007f6a13a93f60 RCX: 00007f6a13980b19 [ 2085.724329] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000007 [ 2085.725774] RBP: 00007f6a10ef61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2085.727229] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000002 [ 2085.728679] R13: 00007ffe4c7e847f R14: 00007f6a10ef6300 R15: 0000000000022000 18:42:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000006) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:42:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000006) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:42:47 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:42:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:42:47 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000000c) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:42:47 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x500, 0x20000022, 0x0) (fail_nth: 96) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) [ 2086.102223] FAULT_INJECTION: forcing a failure. [ 2086.102223] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2086.104903] CPU: 0 PID: 12814 Comm: syz-executor.7 Not tainted 5.10.194 #1 [ 2086.106363] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2086.108066] Call Trace: [ 2086.108609] dump_stack+0x107/0x167 [ 2086.109351] should_fail.cold+0x5/0xa [ 2086.110134] _copy_from_user+0x2e/0x1b0 [ 2086.110951] __copy_msghdr_from_user+0x91/0x4b0 [ 2086.111912] ? __ia32_sys_shutdown+0x80/0x80 [ 2086.112814] ? __lock_acquire+0x1657/0x5b00 [ 2086.113703] ___sys_recvmsg+0xd5/0x200 [ 2086.114499] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 2086.115522] ? lock_acquire+0x197/0x470 [ 2086.116358] ? find_held_lock+0x2c/0x110 [ 2086.117187] ? __might_fault+0xd3/0x180 [ 2086.118043] ? lock_downgrade+0x6d0/0x6d0 [ 2086.118904] do_recvmmsg+0x24c/0x6d0 [ 2086.119702] ? ___sys_recvmsg+0x200/0x200 [ 2086.120556] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2086.121528] ? _raw_spin_unlock_irq+0x27/0x30 [ 2086.122443] ? finish_task_switch+0x126/0x5d0 [ 2086.123413] ? finish_task_switch+0xef/0x5d0 [ 2086.124328] __x64_sys_recvmmsg+0x20f/0x260 [ 2086.125247] ? ksys_write+0x1a9/0x260 [ 2086.126025] ? __do_sys_socketcall+0x600/0x600 [ 2086.127007] do_syscall_64+0x33/0x40 [ 2086.127780] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2086.128865] RIP: 0033:0x7f6a13980b19 [ 2086.129628] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2086.133367] RSP: 002b:00007f6a10ef6188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 2086.134926] RAX: ffffffffffffffda RBX: 00007f6a13a93f60 RCX: 00007f6a13980b19 [ 2086.136386] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000007 [ 2086.137846] RBP: 00007f6a10ef61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2086.139305] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000002 [ 2086.140761] R13: 00007ffe4c7e847f R14: 00007f6a10ef6300 R15: 0000000000022000 18:43:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000000d) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:43:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000007) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:00 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x500, 0x20000022, 0x0) (fail_nth: 97) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:43:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:43:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x0, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:00 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000009) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000007) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) [ 2099.740272] FAULT_INJECTION: forcing a failure. [ 2099.740272] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2099.741801] CPU: 1 PID: 12835 Comm: syz-executor.7 Not tainted 5.10.194 #1 [ 2099.742607] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2099.743577] Call Trace: [ 2099.743888] dump_stack+0x107/0x167 [ 2099.744309] should_fail.cold+0x5/0xa [ 2099.744760] _copy_from_user+0x2e/0x1b0 [ 2099.745222] __copy_msghdr_from_user+0x91/0x4b0 [ 2099.745775] ? __ia32_sys_shutdown+0x80/0x80 [ 2099.746281] ? __lock_acquire+0x1657/0x5b00 [ 2099.746783] ___sys_recvmsg+0xd5/0x200 [ 2099.747225] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 2099.747807] ? lock_downgrade+0x6d0/0x6d0 [ 2099.748283] ? lock_acquire+0x197/0x470 [ 2099.748739] ? find_held_lock+0x2c/0x110 [ 2099.749212] ? __might_fault+0xd3/0x180 [ 2099.749669] ? lock_downgrade+0x6d0/0x6d0 [ 2099.750147] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2099.750780] do_recvmmsg+0x24c/0x6d0 [ 2099.751209] ? ___sys_recvmsg+0x200/0x200 [ 2099.751696] ? lock_downgrade+0x6d0/0x6d0 [ 2099.752180] ? ksys_write+0x12d/0x260 [ 2099.752622] ? wait_for_completion_io+0x270/0x270 [ 2099.753179] ? rcu_read_lock_any_held+0x75/0xa0 [ 2099.753716] ? vfs_write+0x354/0xa70 [ 2099.754142] __x64_sys_recvmmsg+0x20f/0x260 [ 2099.754638] ? ksys_write+0x1a9/0x260 [ 2099.755072] ? __do_sys_socketcall+0x600/0x600 [ 2099.755601] do_syscall_64+0x33/0x40 [ 2099.756023] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2099.756605] RIP: 0033:0x7f6a13980b19 [ 2099.757031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2099.759077] RSP: 002b:00007f6a10ef6188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 2099.759951] RAX: ffffffffffffffda RBX: 00007f6a13a93f60 RCX: 00007f6a13980b19 [ 2099.760763] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000007 [ 2099.761571] RBP: 00007f6a10ef61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2099.762378] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000002 [ 2099.763176] R13: 00007ffe4c7e847f R14: 00007f6a10ef6300 R15: 0000000000022000 18:43:01 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x500, 0x20000022, 0x0) (fail_nth: 98) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) [ 2099.992904] FAULT_INJECTION: forcing a failure. [ 2099.992904] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2099.995796] CPU: 0 PID: 12861 Comm: syz-executor.7 Not tainted 5.10.194 #1 [ 2099.997226] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2099.998939] Call Trace: [ 2099.999526] dump_stack+0x107/0x167 [ 2100.000289] should_fail.cold+0x5/0xa [ 2100.001095] _copy_from_user+0x2e/0x1b0 [ 2100.001935] __copy_msghdr_from_user+0x91/0x4b0 [ 2100.002898] ? __ia32_sys_shutdown+0x80/0x80 [ 2100.003815] ? __lock_acquire+0x1657/0x5b00 [ 2100.004719] ___sys_recvmsg+0xd5/0x200 [ 2100.005526] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 2100.006538] ? _raw_spin_unlock_irq+0x27/0x30 [ 2100.007498] ? lock_acquire+0x197/0x470 [ 2100.008311] ? find_held_lock+0x2c/0x110 [ 2100.009157] ? __might_fault+0xd3/0x180 [ 2100.009989] ? lock_downgrade+0x6d0/0x6d0 [ 2100.010858] ? io_schedule_timeout+0x140/0x140 [ 2100.011815] do_recvmmsg+0x24c/0x6d0 [ 2100.012591] ? ___sys_recvmsg+0x200/0x200 [ 2100.013450] ? lock_downgrade+0x6d0/0x6d0 [ 2100.014327] ? ksys_write+0x12d/0x260 [ 2100.015119] ? wait_for_completion_io+0x270/0x270 [ 2100.016132] ? rcu_read_lock_any_held+0x75/0xa0 [ 2100.017071] ? vfs_write+0x354/0xa70 [ 2100.017870] __x64_sys_recvmmsg+0x20f/0x260 [ 2100.018742] ? ksys_write+0x1a9/0x260 [ 2100.019551] ? __do_sys_socketcall+0x600/0x600 [ 2100.020485] do_syscall_64+0x33/0x40 [ 2100.021284] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2100.022370] RIP: 0033:0x7f6a13980b19 [ 2100.023134] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2100.027054] RSP: 002b:00007f6a10ef6188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 2100.028617] RAX: ffffffffffffffda RBX: 00007f6a13a93f60 RCX: 00007f6a13980b19 [ 2100.030052] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000007 [ 2100.031518] RBP: 00007f6a10ef61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2100.032981] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000002 [ 2100.034413] R13: 00007ffe4c7e847f R14: 00007f6a10ef6300 R15: 0000000000022000 18:43:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000008) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:01 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x500, 0x20000022, 0x0) (fail_nth: 99) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) [ 2100.263957] FAULT_INJECTION: forcing a failure. [ 2100.263957] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2100.266684] CPU: 1 PID: 12873 Comm: syz-executor.7 Not tainted 5.10.194 #1 [ 2100.268147] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2100.269835] Call Trace: [ 2100.270377] dump_stack+0x107/0x167 [ 2100.271138] should_fail.cold+0x5/0xa [ 2100.271946] _copy_from_user+0x2e/0x1b0 [ 2100.272780] __copy_msghdr_from_user+0x91/0x4b0 [ 2100.273739] ? __ia32_sys_shutdown+0x80/0x80 [ 2100.274646] ? __lock_acquire+0x1657/0x5b00 [ 2100.275569] ___sys_recvmsg+0xd5/0x200 [ 2100.276375] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 2100.277391] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2100.278476] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2100.279455] ? trace_hardirqs_on+0x5b/0x180 [ 2100.280349] ? lock_acquire+0x197/0x470 [ 2100.281187] ? find_held_lock+0x2c/0x110 [ 2100.282036] ? __might_fault+0xd3/0x180 [ 2100.282894] ? lock_downgrade+0x6d0/0x6d0 [ 2100.283750] ? io_schedule_timeout+0x140/0x140 [ 2100.284766] do_recvmmsg+0x24c/0x6d0 [ 2100.285546] ? ___sys_recvmsg+0x200/0x200 [ 2100.286430] ? lock_downgrade+0x6d0/0x6d0 [ 2100.287313] ? ksys_write+0x12d/0x260 [ 2100.288167] ? wait_for_completion_io+0x270/0x270 [ 2100.289161] ? rcu_read_lock_any_held+0x75/0xa0 [ 2100.290151] ? vfs_write+0x354/0xa70 [ 2100.290931] __x64_sys_recvmmsg+0x20f/0x260 [ 2100.291828] ? ksys_write+0x1a9/0x260 [ 2100.292611] ? __do_sys_socketcall+0x600/0x600 [ 2100.293551] do_syscall_64+0x33/0x40 [ 2100.294306] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2100.295374] RIP: 0033:0x7f6a13980b19 [ 2100.296145] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2100.299926] RSP: 002b:00007f6a10ef6188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 2100.301491] RAX: ffffffffffffffda RBX: 00007f6a13a93f60 RCX: 00007f6a13980b19 [ 2100.302944] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000007 [ 2100.304419] RBP: 00007f6a10ef61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2100.305886] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000002 [ 2100.307374] R13: 00007ffe4c7e847f R14: 00007f6a10ef6300 R15: 0000000000022000 18:43:01 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000000a) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:01 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x500, 0x20000022, 0x0) (fail_nth: 100) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:43:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x0, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec5", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) [ 2100.539800] FAULT_INJECTION: forcing a failure. [ 2100.539800] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2100.542616] CPU: 1 PID: 12884 Comm: syz-executor.7 Not tainted 5.10.194 #1 [ 2100.544053] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2100.545782] Call Trace: [ 2100.546334] dump_stack+0x107/0x167 [ 2100.547092] should_fail.cold+0x5/0xa [ 2100.547916] _copy_from_user+0x2e/0x1b0 [ 2100.548753] __copy_msghdr_from_user+0x91/0x4b0 [ 2100.549709] ? __ia32_sys_shutdown+0x80/0x80 [ 2100.550606] ? __lock_acquire+0x1657/0x5b00 [ 2100.551515] ___sys_recvmsg+0xd5/0x200 [ 2100.552305] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 2100.553301] ? lock_downgrade+0x6d0/0x6d0 [ 2100.554153] ? lock_acquire+0x197/0x470 [ 2100.554956] ? find_held_lock+0x2c/0x110 [ 2100.555815] ? __might_fault+0xd3/0x180 [ 2100.556617] ? lock_downgrade+0x6d0/0x6d0 [ 2100.557474] do_recvmmsg+0x24c/0x6d0 [ 2100.558241] ? ___sys_recvmsg+0x200/0x200 [ 2100.559087] ? lock_downgrade+0x6d0/0x6d0 [ 2100.559951] ? ksys_write+0x12d/0x260 [ 2100.560739] ? wait_for_completion_io+0x270/0x270 [ 2100.561717] ? rcu_read_lock_any_held+0x75/0xa0 [ 2100.562667] ? vfs_write+0x354/0xa70 [ 2100.563447] __x64_sys_recvmmsg+0x20f/0x260 [ 2100.564325] ? ksys_write+0x1a9/0x260 [ 2100.565108] ? __do_sys_socketcall+0x600/0x600 [ 2100.566050] do_syscall_64+0x33/0x40 [ 2100.566848] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2100.567905] RIP: 0033:0x7f6a13980b19 [ 2100.568675] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2100.572411] RSP: 002b:00007f6a10ef6188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 2100.573952] RAX: ffffffffffffffda RBX: 00007f6a13a93f60 RCX: 00007f6a13980b19 [ 2100.575406] RDX: 0000000000000500 RSI: 0000000020007940 RDI: 0000000000000007 [ 2100.576849] RBP: 00007f6a10ef61d0 R08: 0000000000000000 R09: 0000000000000000 [ 2100.578298] R10: 0000000020000022 R11: 0000000000000246 R12: 0000000000000003 [ 2100.579769] R13: 00007ffe4c7e847f R14: 00007f6a10ef6300 R15: 0000000000022000 18:43:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000008) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:02 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000000f) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:43:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000009) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:02 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:43:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x0, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:15 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000000b) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000000a) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec5", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:43:15 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200002, 0x0}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:43:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000010) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:43:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000009) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200004, 0x0}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:43:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x202000, 0x0}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:43:16 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:43:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000000b) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x204000, 0x0}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:43:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000000c) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000000a) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:29 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x2}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:43:29 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000000c) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000011) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:43:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec5", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:43:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000000b) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:29 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x4}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:43:30 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x2000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:43:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000102) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:43:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000000b) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 1) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:44 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x4000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:43:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000112) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:43:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000000d) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000000c) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:43:44 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000000d) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) [ 2143.315877] FAULT_INJECTION: forcing a failure. [ 2143.315877] name failslab, interval 1, probability 0, space 0, times 0 [ 2143.317561] CPU: 0 PID: 13059 Comm: syz-executor.0 Not tainted 5.10.194 #1 [ 2143.318361] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2143.319321] Call Trace: [ 2143.319629] dump_stack+0x107/0x167 [ 2143.320062] should_fail.cold+0x5/0xa [ 2143.320497] ? alloc_pipe_info+0x10a/0x590 [ 2143.320981] should_failslab+0x5/0x20 [ 2143.321401] kmem_cache_alloc_trace+0x55/0x320 [ 2143.321904] alloc_pipe_info+0x10a/0x590 [ 2143.322369] splice_direct_to_actor+0x774/0x980 [ 2143.322892] ? _cond_resched+0x12/0x80 [ 2143.323316] ? inode_security+0x107/0x140 [ 2143.323776] ? pipe_to_sendpage+0x380/0x380 [ 2143.324265] ? selinux_file_permission+0x92/0x520 [ 2143.324793] ? do_splice_to+0x160/0x160 [ 2143.325256] ? security_file_permission+0x24e/0x570 [ 2143.325820] do_splice_direct+0x1c4/0x290 [ 2143.326302] ? splice_direct_to_actor+0x980/0x980 [ 2143.326855] ? selinux_file_permission+0x92/0x520 [ 2143.327415] ? security_file_permission+0x24e/0x570 [ 2143.328011] do_sendfile+0x553/0x1090 [ 2143.328454] ? do_pwritev+0x270/0x270 [ 2143.328892] ? wait_for_completion_io+0x270/0x270 [ 2143.329444] ? rcu_read_lock_any_held+0x75/0xa0 [ 2143.329968] ? vfs_write+0x354/0xa70 [ 2143.330403] __x64_sys_sendfile64+0x1d1/0x210 [ 2143.330918] ? __ia32_sys_sendfile+0x220/0x220 [ 2143.331446] do_syscall_64+0x33/0x40 [ 2143.331871] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2143.332430] RIP: 0033:0x7fa3e7cb1b19 [ 2143.332847] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2143.334826] RSP: 002b:00007fa3e5227188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2143.335659] RAX: ffffffffffffffda RBX: 00007fa3e7dc4f60 RCX: 00007fa3e7cb1b19 [ 2143.336492] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2143.337290] RBP: 00007fa3e52271d0 R08: 0000000000000000 R09: 0000000000000000 [ 2143.338070] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2143.338881] R13: 00007ffdc063e89f R14: 00007fa3e5227300 R15: 0000000000022000 18:43:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 2) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) [ 2143.433684] FAULT_INJECTION: forcing a failure. [ 2143.433684] name failslab, interval 1, probability 0, space 0, times 0 [ 2143.435142] CPU: 0 PID: 13080 Comm: syz-executor.0 Not tainted 5.10.194 #1 [ 2143.435887] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2143.436811] Call Trace: [ 2143.437121] dump_stack+0x107/0x167 [ 2143.437543] should_fail.cold+0x5/0xa [ 2143.437978] ? create_object.isra.0+0x3a/0xa20 [ 2143.438487] should_failslab+0x5/0x20 [ 2143.438923] kmem_cache_alloc+0x5b/0x310 [ 2143.439398] create_object.isra.0+0x3a/0xa20 [ 2143.439909] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2143.440496] kmem_cache_alloc_trace+0x151/0x320 [ 2143.441061] alloc_pipe_info+0x10a/0x590 [ 2143.441552] splice_direct_to_actor+0x774/0x980 [ 2143.442095] ? _cond_resched+0x12/0x80 [ 2143.442562] ? inode_security+0x107/0x140 [ 2143.443034] ? pipe_to_sendpage+0x380/0x380 [ 2143.443518] ? selinux_file_permission+0x92/0x520 [ 2143.444060] ? do_splice_to+0x160/0x160 [ 2143.444506] ? security_file_permission+0x24e/0x570 [ 2143.445062] do_splice_direct+0x1c4/0x290 [ 2143.445510] ? splice_direct_to_actor+0x980/0x980 [ 2143.446064] ? selinux_file_permission+0x92/0x520 [ 2143.446613] ? security_file_permission+0x24e/0x570 [ 2143.447155] do_sendfile+0x553/0x1090 [ 2143.447586] ? do_pwritev+0x270/0x270 [ 2143.448019] ? wait_for_completion_io+0x270/0x270 [ 2143.448565] ? rcu_read_lock_any_held+0x75/0xa0 [ 2143.449070] ? vfs_write+0x354/0xa70 [ 2143.449493] __x64_sys_sendfile64+0x1d1/0x210 [ 2143.449991] ? __ia32_sys_sendfile+0x220/0x220 [ 2143.450504] do_syscall_64+0x33/0x40 [ 2143.450923] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2143.451481] RIP: 0033:0x7fa3e7cb1b19 [ 2143.451916] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2143.453885] RSP: 002b:00007fa3e5227188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2143.454725] RAX: ffffffffffffffda RBX: 00007fa3e7dc4f60 RCX: 00007fa3e7cb1b19 [ 2143.455524] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2143.456300] RBP: 00007fa3e52271d0 R08: 0000000000000000 R09: 0000000000000000 [ 2143.457080] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2143.457867] R13: 00007ffdc063e89f R14: 00007fa3e5227300 R15: 0000000000022000 18:43:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 3) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:44 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x40000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:43:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000000d) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) [ 2143.784200] FAULT_INJECTION: forcing a failure. [ 2143.784200] name failslab, interval 1, probability 0, space 0, times 0 [ 2143.786204] CPU: 1 PID: 13095 Comm: syz-executor.0 Not tainted 5.10.194 #1 [ 2143.787266] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2143.788582] Call Trace: [ 2143.789003] dump_stack+0x107/0x167 [ 2143.789573] should_fail.cold+0x5/0xa [ 2143.790172] ? alloc_pipe_info+0x1e5/0x590 [ 2143.790858] should_failslab+0x5/0x20 [ 2143.791454] __kmalloc+0x72/0x390 [ 2143.792004] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2143.792813] alloc_pipe_info+0x1e5/0x590 [ 2143.793432] splice_direct_to_actor+0x774/0x980 [ 2143.794134] ? _cond_resched+0x12/0x80 [ 2143.794728] ? inode_security+0x107/0x140 [ 2143.795367] ? pipe_to_sendpage+0x380/0x380 [ 2143.796040] ? selinux_file_permission+0x92/0x520 [ 2143.796782] ? do_splice_to+0x160/0x160 [ 2143.797383] ? security_file_permission+0x24e/0x570 [ 2143.798156] do_splice_direct+0x1c4/0x290 [ 2143.798817] ? splice_direct_to_actor+0x980/0x980 [ 2143.799576] ? selinux_file_permission+0x92/0x520 [ 2143.800350] ? security_file_permission+0x24e/0x570 [ 2143.801119] do_sendfile+0x553/0x1090 [ 2143.801715] ? do_pwritev+0x270/0x270 18:43:45 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000000f) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) [ 2143.802461] ? wait_for_completion_io+0x270/0x270 [ 2143.803254] ? rcu_read_lock_any_held+0x75/0xa0 [ 2143.803973] ? vfs_write+0x354/0xa70 [ 2143.804558] __x64_sys_sendfile64+0x1d1/0x210 [ 2143.805263] ? __ia32_sys_sendfile+0x220/0x220 [ 2143.805987] do_syscall_64+0x33/0x40 [ 2143.806563] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2143.807378] RIP: 0033:0x7fa3e7cb1b19 [ 2143.807989] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2143.810892] RSP: 002b:00007fa3e5227188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2143.812118] RAX: ffffffffffffffda RBX: 00007fa3e7dc4f60 RCX: 00007fa3e7cb1b19 [ 2143.813214] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2143.814351] RBP: 00007fa3e52271d0 R08: 0000000000000000 R09: 0000000000000000 [ 2143.815533] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2143.816662] R13: 00007ffdc063e89f R14: 00007fa3e5227300 R15: 0000000000022000 18:43:45 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x200000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:43:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:43:57 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x2000000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:43:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000000f) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:43:57 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000000e) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x1000001da) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:43:57 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000010) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={r2, "b76a24f24ac24227549f48ce1baee3b2"}) [ 2156.747124] FAULT_INJECTION: forcing a failure. [ 2156.747124] name failslab, interval 1, probability 0, space 0, times 0 [ 2156.750851] CPU: 0 PID: 13136 Comm: syz-executor.0 Not tainted 5.10.194 #1 [ 2156.752433] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2156.754232] Call Trace: [ 2156.754815] dump_stack+0x107/0x167 [ 2156.755633] should_fail.cold+0x5/0xa [ 2156.756489] ? create_object.isra.0+0x3a/0xa20 [ 2156.757508] should_failslab+0x5/0x20 [ 2156.758342] kmem_cache_alloc+0x5b/0x310 [ 2156.759235] create_object.isra.0+0x3a/0xa20 [ 2156.760216] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2156.761326] __kmalloc+0x16e/0x390 [ 2156.762109] alloc_pipe_info+0x1e5/0x590 [ 2156.762998] splice_direct_to_actor+0x774/0x980 [ 2156.764008] ? _cond_resched+0x12/0x80 [ 2156.764864] ? inode_security+0x107/0x140 [ 2156.765760] ? pipe_to_sendpage+0x380/0x380 [ 2156.766695] ? selinux_file_permission+0x92/0x520 [ 2156.767738] ? do_splice_to+0x160/0x160 [ 2156.768631] ? security_file_permission+0x24e/0x570 [ 2156.769722] do_splice_direct+0x1c4/0x290 [ 2156.770692] ? splice_direct_to_actor+0x980/0x980 [ 2156.771734] ? selinux_file_permission+0x92/0x520 [ 2156.772859] ? security_file_permission+0x24e/0x570 [ 2156.773950] do_sendfile+0x553/0x1090 [ 2156.774827] ? do_pwritev+0x270/0x270 [ 2156.775655] ? wait_for_completion_io+0x270/0x270 [ 2156.776784] ? rcu_read_lock_any_held+0x75/0xa0 [ 2156.777829] ? vfs_write+0x354/0xa70 [ 2156.778643] __x64_sys_sendfile64+0x1d1/0x210 [ 2156.779673] ? __ia32_sys_sendfile+0x220/0x220 [ 2156.780682] do_syscall_64+0x33/0x40 [ 2156.781543] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2156.782652] RIP: 0033:0x7fa3e7cb1b19 [ 2156.783494] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2156.787478] RSP: 002b:00007fa3e5227188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2156.789241] RAX: ffffffffffffffda RBX: 00007fa3e7dc4f60 RCX: 00007fa3e7cb1b19 [ 2156.790780] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2156.792418] RBP: 00007fa3e52271d0 R08: 0000000000000000 R09: 0000000000000000 [ 2156.793956] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2156.795590] R13: 00007ffdc063e89f R14: 00007fa3e5227300 R15: 0000000000022000 18:43:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000000f) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:58 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x40000000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:43:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x1000004f9) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:43:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={r2, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:58 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x4000000000000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:43:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:43:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000010) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:43:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 5) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000010) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:58 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000011) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:43:58 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x20000000000000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:43:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:43:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={r2, "b76a24f24ac24227549f48ce1baee3b2"}) [ 2157.499119] FAULT_INJECTION: forcing a failure. [ 2157.499119] name failslab, interval 1, probability 0, space 0, times 0 [ 2157.500638] CPU: 1 PID: 13214 Comm: syz-executor.0 Not tainted 5.10.194 #1 [ 2157.501378] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2157.502282] Call Trace: [ 2157.502575] dump_stack+0x107/0x167 [ 2157.502968] should_fail.cold+0x5/0xa [ 2157.503383] ? alloc_pipe_info+0x1e5/0x590 [ 2157.503850] should_failslab+0x5/0x20 [ 2157.504265] __kmalloc+0x72/0x390 [ 2157.504702] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2157.505302] alloc_pipe_info+0x1e5/0x590 [ 2157.505857] splice_direct_to_actor+0x774/0x980 [ 2157.506428] ? _cond_resched+0x12/0x80 [ 2157.506929] ? inode_security+0x107/0x140 [ 2157.507381] ? pipe_to_sendpage+0x380/0x380 [ 2157.507842] ? selinux_file_permission+0x92/0x520 [ 2157.508371] ? do_splice_to+0x160/0x160 [ 2157.508808] ? security_file_permission+0x24e/0x570 [ 2157.509343] do_splice_direct+0x1c4/0x290 [ 2157.509800] ? splice_direct_to_actor+0x980/0x980 [ 2157.510318] ? selinux_file_permission+0x92/0x520 [ 2157.510837] ? security_file_permission+0x24e/0x570 [ 2157.511379] do_sendfile+0x553/0x1090 [ 2157.511790] ? do_pwritev+0x270/0x270 [ 2157.512202] ? wait_for_completion_io+0x270/0x270 [ 2157.512723] ? rcu_read_lock_any_held+0x75/0xa0 [ 2157.513220] ? vfs_write+0x354/0xa70 [ 2157.513635] __x64_sys_sendfile64+0x1d1/0x210 [ 2157.514142] ? __ia32_sys_sendfile+0x220/0x220 [ 2157.514753] do_syscall_64+0x33/0x40 [ 2157.515160] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2157.515885] RIP: 0033:0x7fa3e7cb1b19 [ 2157.516379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2157.518525] RSP: 002b:00007fa3e5206188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2157.519331] RAX: ffffffffffffffda RBX: 00007fa3e7dc5020 RCX: 00007fa3e7cb1b19 [ 2157.520106] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000007 [ 2157.520864] RBP: 00007fa3e52061d0 R08: 0000000000000000 R09: 0000000000000000 [ 2157.521632] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2157.522395] R13: 00007ffdc063e89f R14: 00007fa3e5206300 R15: 0000000000022000 18:43:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:44:13 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 6) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:44:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000011) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:44:13 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, 0x0) 18:44:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000011) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:44:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000505) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:44:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:44:13 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000102) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:44:13 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x200000000000000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) [ 2172.841791] FAULT_INJECTION: forcing a failure. [ 2172.841791] name failslab, interval 1, probability 0, space 0, times 0 [ 2172.844662] CPU: 1 PID: 13245 Comm: syz-executor.0 Not tainted 5.10.194 #1 [ 2172.846193] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2172.848038] Call Trace: [ 2172.848642] dump_stack+0x107/0x167 [ 2172.849472] should_fail.cold+0x5/0xa [ 2172.850328] ? create_object.isra.0+0x3a/0xa20 [ 2172.851353] should_failslab+0x5/0x20 [ 2172.852207] kmem_cache_alloc+0x5b/0x310 [ 2172.853116] ? igrab+0xc0/0xc0 [ 2172.853835] create_object.isra.0+0x3a/0xa20 [ 2172.854810] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2172.855946] __kmalloc+0x16e/0x390 [ 2172.856753] iter_file_splice_write+0x16d/0xc30 [ 2172.857794] ? atime_needs_update+0x600/0x600 [ 2172.858820] ? generic_splice_sendpage+0x140/0x140 [ 2172.859904] ? pipe_to_user+0x170/0x170 [ 2172.860779] ? _cond_resched+0x12/0x80 [ 2172.861641] ? avc_policy_seqno+0x9/0x70 [ 2172.862526] ? selinux_file_permission+0x92/0x520 [ 2172.863614] ? lockdep_init_map_type+0x2c7/0x780 [ 2172.864657] ? generic_splice_sendpage+0x140/0x140 [ 2172.865741] direct_splice_actor+0x10f/0x170 [ 2172.866704] splice_direct_to_actor+0x387/0x980 [ 2172.867716] ? pipe_to_sendpage+0x380/0x380 [ 2172.868682] ? do_splice_to+0x160/0x160 [ 2172.869556] ? security_file_permission+0x24e/0x570 [ 2172.870660] do_splice_direct+0x1c4/0x290 [ 2172.871564] ? splice_direct_to_actor+0x980/0x980 [ 2172.872638] ? selinux_file_permission+0x92/0x520 [ 2172.873708] ? security_file_permission+0x24e/0x570 [ 2172.874818] do_sendfile+0x553/0x1090 [ 2172.875673] ? do_pwritev+0x270/0x270 [ 2172.876512] ? wait_for_completion_io+0x270/0x270 [ 2172.877581] ? rcu_read_lock_any_held+0x75/0xa0 [ 2172.878598] ? vfs_write+0x354/0xa70 [ 2172.879417] __x64_sys_sendfile64+0x1d1/0x210 [ 2172.880412] ? __ia32_sys_sendfile+0x220/0x220 [ 2172.881410] do_syscall_64+0x33/0x40 [ 2172.882227] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2172.883322] RIP: 0033:0x7fa3e7cb1b19 [ 2172.884144] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2172.888132] RSP: 002b:00007fa3e5227188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2172.889806] RAX: ffffffffffffffda RBX: 00007fa3e7dc4f60 RCX: 00007fa3e7cb1b19 [ 2172.891367] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2172.893109] RBP: 00007fa3e52271d0 R08: 0000000000000000 R09: 0000000000000000 [ 2172.894691] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2172.896255] R13: 00007ffdc063e89f R14: 00007fa3e5227300 R15: 0000000000022000 18:44:30 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x4000000000000000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:44:30 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000112) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:44:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x1000001da) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:44:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000506) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:44:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, 0x0) 18:44:30 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 7) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:44:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000102) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:44:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:44:30 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0xffffffff00000000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) [ 2189.021179] FAULT_INJECTION: forcing a failure. [ 2189.021179] name failslab, interval 1, probability 0, space 0, times 0 [ 2189.023739] CPU: 0 PID: 13300 Comm: syz-executor.0 Not tainted 5.10.194 #1 [ 2189.025186] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2189.026907] Call Trace: [ 2189.027463] dump_stack+0x107/0x167 [ 2189.028210] should_fail.cold+0x5/0xa [ 2189.029009] ? iter_file_splice_write+0x16d/0xc30 [ 2189.030001] should_failslab+0x5/0x20 [ 2189.030777] __kmalloc+0x72/0x390 [ 2189.031496] iter_file_splice_write+0x16d/0xc30 [ 2189.032441] ? atime_needs_update+0x600/0x600 [ 2189.033399] ? generic_splice_sendpage+0x140/0x140 [ 2189.034394] ? pipe_to_user+0x170/0x170 [ 2189.035202] ? _cond_resched+0x12/0x80 18:44:30 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x0, 0x0, 0x2}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) [ 2189.035987] ? avc_policy_seqno+0x9/0x70 [ 2189.036885] ? selinux_file_permission+0x92/0x520 [ 2189.037868] ? lockdep_init_map_type+0x2c7/0x780 [ 2189.038816] ? generic_splice_sendpage+0x140/0x140 [ 2189.039794] direct_splice_actor+0x10f/0x170 [ 2189.040692] splice_direct_to_actor+0x387/0x980 [ 2189.041638] ? pipe_to_sendpage+0x380/0x380 [ 2189.042506] ? do_splice_to+0x160/0x160 [ 2189.043309] ? security_file_permission+0x24e/0x570 [ 2189.044322] do_splice_direct+0x1c4/0x290 [ 2189.045182] ? splice_direct_to_actor+0x980/0x980 [ 2189.046180] ? selinux_file_permission+0x92/0x520 [ 2189.047192] ? security_file_permission+0x24e/0x570 [ 2189.048225] do_sendfile+0x553/0x1090 [ 2189.049006] ? do_pwritev+0x270/0x270 [ 2189.049779] ? setup_APIC_eilvt+0x2f0/0x2f0 [ 2189.050648] ? tick_program_event+0xa8/0x140 [ 2189.051536] __x64_sys_sendfile64+0x1d1/0x210 [ 2189.052485] ? __ia32_sys_sendfile+0x220/0x220 [ 2189.053433] do_syscall_64+0x33/0x40 [ 2189.054192] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2189.055225] RIP: 0033:0x7fa3e7cb1b19 [ 2189.055975] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2189.059654] RSP: 002b:00007fa3e5227188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2189.061181] RAX: ffffffffffffffda RBX: 00007fa3e7dc4f60 RCX: 00007fa3e7cb1b19 [ 2189.062638] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2189.064065] RBP: 00007fa3e52271d0 R08: 0000000000000000 R09: 0000000000000000 [ 2189.065519] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2189.066975] R13: 00007ffdc063e89f R14: 00007fa3e5227300 R15: 0000000000022000 18:44:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:44:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x1000001da) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:44:30 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 8) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:44:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000507) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:44:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) [ 2189.303193] FAULT_INJECTION: forcing a failure. [ 2189.303193] name failslab, interval 1, probability 0, space 0, times 0 [ 2189.304789] CPU: 1 PID: 13331 Comm: syz-executor.0 Not tainted 5.10.194 #1 [ 2189.305479] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2189.306308] Call Trace: [ 2189.306606] dump_stack+0x107/0x167 [ 2189.307006] should_fail.cold+0x5/0xa [ 2189.307398] ? create_object.isra.0+0x3a/0xa20 [ 2189.307894] should_failslab+0x5/0x20 [ 2189.308275] kmem_cache_alloc+0x5b/0x310 [ 2189.308695] create_object.isra.0+0x3a/0xa20 [ 2189.309128] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2189.309695] kmem_cache_alloc+0x159/0x310 [ 2189.310113] alloc_buffer_head+0x20/0x110 [ 2189.310579] alloc_page_buffers+0x14d/0x700 [ 2189.311060] create_empty_buffers+0x2c/0x640 [ 2189.311507] create_page_buffers+0x1bb/0x230 [ 2189.311952] __block_write_begin_int+0x1d1/0x19c0 [ 2189.312433] ? fat_add_cluster+0x100/0x100 [ 2189.312869] ? add_to_page_cache_locked+0x40/0x40 [ 2189.313347] ? __page_cache_alloc+0x10d/0x360 [ 2189.313790] ? remove_inode_buffers+0x300/0x300 [ 2189.314253] ? pagecache_get_page+0x243/0xc80 [ 2189.314704] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2189.315224] ? wait_for_stable_page+0x92/0xe0 [ 2189.315675] cont_write_begin+0x472/0x980 [ 2189.316092] ? fat_add_cluster+0x100/0x100 [ 2189.316519] ? nobh_write_begin+0xed0/0xed0 [ 2189.316942] ? __mark_inode_dirty+0x93b/0xd40 [ 2189.317389] ? lock_downgrade+0x6d0/0x6d0 [ 2189.317802] ? do_raw_spin_lock+0x121/0x260 [ 2189.318230] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2189.318739] ? rwlock_bug.part.0+0x90/0x90 [ 2189.319170] fat_write_begin+0x89/0x180 [ 2189.319568] ? fat_add_cluster+0x100/0x100 [ 2189.319992] generic_perform_write+0x20a/0x4f0 [ 2189.320465] ? fat_direct_IO+0x1ef/0x380 [ 2189.320883] ? page_cache_next_miss+0x310/0x310 [ 2189.321356] __generic_file_write_iter+0x2cd/0x5d0 [ 2189.321844] generic_file_write_iter+0xdb/0x230 [ 2189.322309] do_iter_readv_writev+0x476/0x750 [ 2189.322757] ? new_sync_write+0x660/0x660 [ 2189.323167] ? selinux_file_permission+0x92/0x520 [ 2189.323654] do_iter_write+0x191/0x670 [ 2189.324055] ? trace_hardirqs_on+0x5b/0x180 [ 2189.324494] vfs_iter_write+0x70/0xa0 [ 2189.324881] iter_file_splice_write+0x762/0xc30 [ 2189.325349] ? generic_splice_sendpage+0x140/0x140 [ 2189.325844] ? avc_policy_seqno+0x9/0x70 [ 2189.326248] ? selinux_file_permission+0x92/0x520 [ 2189.326738] ? lockdep_init_map_type+0x2c7/0x780 [ 2189.327208] ? generic_splice_sendpage+0x140/0x140 [ 2189.327697] direct_splice_actor+0x10f/0x170 [ 2189.328134] splice_direct_to_actor+0x387/0x980 [ 2189.328607] ? pipe_to_sendpage+0x380/0x380 [ 2189.329039] ? do_splice_to+0x160/0x160 [ 2189.329442] ? security_file_permission+0x24e/0x570 [ 2189.329944] do_splice_direct+0x1c4/0x290 [ 2189.330361] ? splice_direct_to_actor+0x980/0x980 [ 2189.330838] ? selinux_file_permission+0x92/0x520 [ 2189.331320] ? security_file_permission+0x24e/0x570 [ 2189.331821] do_sendfile+0x553/0x1090 [ 2189.332220] ? do_pwritev+0x270/0x270 [ 2189.332617] ? wait_for_completion_io+0x270/0x270 [ 2189.333116] ? rcu_read_lock_any_held+0x75/0xa0 [ 2189.333589] ? vfs_write+0x354/0xa70 [ 2189.333974] __x64_sys_sendfile64+0x1d1/0x210 [ 2189.334422] ? __ia32_sys_sendfile+0x220/0x220 [ 2189.334889] do_syscall_64+0x33/0x40 [ 2189.335263] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2189.335773] RIP: 0033:0x7fa3e7cb1b19 [ 2189.336157] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2189.338004] RSP: 002b:00007fa3e5227188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2189.338765] RAX: ffffffffffffffda RBX: 00007fa3e7dc4f60 RCX: 00007fa3e7cb1b19 [ 2189.339469] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2189.340179] RBP: 00007fa3e52271d0 R08: 0000000000000000 R09: 0000000000000000 [ 2189.340894] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2189.341597] R13: 00007ffdc063e89f R14: 00007fa3e5227300 R15: 0000000000022000 18:44:30 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x1000001da) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:44:30 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x0, 0x0, 0x4}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:44:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000505) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:44:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:44:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, 0x0) 18:44:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:44:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x1000004f9) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:44:31 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x0, 0x0, 0x2000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:44:31 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000508) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:44:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 9) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:44:31 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x0, 0x0, 0x4000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:44:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000506) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) [ 2190.371939] FAULT_INJECTION: forcing a failure. [ 2190.371939] name failslab, interval 1, probability 0, space 0, times 0 [ 2190.373909] CPU: 0 PID: 13389 Comm: syz-executor.0 Not tainted 5.10.194 #1 [ 2190.375100] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2190.376532] Call Trace: [ 2190.377001] dump_stack+0x107/0x167 [ 2190.377652] should_fail.cold+0x5/0xa [ 2190.378337] ? create_object.isra.0+0x3a/0xa20 [ 2190.379132] should_failslab+0x5/0x20 [ 2190.379787] kmem_cache_alloc+0x5b/0x310 [ 2190.380495] create_object.isra.0+0x3a/0xa20 [ 2190.381255] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2190.382132] kmem_cache_alloc+0x159/0x310 [ 2190.382864] alloc_buffer_head+0x20/0x110 [ 2190.383552] alloc_page_buffers+0x14d/0x700 [ 2190.384294] create_empty_buffers+0x2c/0x640 [ 2190.385041] create_page_buffers+0x1bb/0x230 [ 2190.385756] __block_write_begin_int+0x1d1/0x19c0 [ 2190.386546] ? fat_add_cluster+0x100/0x100 [ 2190.387228] ? add_to_page_cache_locked+0x40/0x40 [ 2190.388002] ? __page_cache_alloc+0x10d/0x360 [ 2190.388766] ? remove_inode_buffers+0x300/0x300 [ 2190.389564] ? pagecache_get_page+0x243/0xc80 [ 2190.390335] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2190.391189] ? wait_for_stable_page+0x92/0xe0 [ 2190.391948] cont_write_begin+0x472/0x980 [ 2190.392659] ? fat_add_cluster+0x100/0x100 [ 2190.393389] ? nobh_write_begin+0xed0/0xed0 [ 2190.394054] ? __mark_inode_dirty+0x93b/0xd40 [ 2190.394736] ? lock_downgrade+0x6d0/0x6d0 [ 2190.395385] ? do_raw_spin_lock+0x121/0x260 [ 2190.396042] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2190.396843] ? rwlock_bug.part.0+0x90/0x90 [ 2190.397487] fat_write_begin+0x89/0x180 [ 2190.398088] ? fat_add_cluster+0x100/0x100 [ 2190.398732] generic_perform_write+0x20a/0x4f0 [ 2190.399432] ? fat_direct_IO+0x1ef/0x380 [ 2190.400064] ? page_cache_next_miss+0x310/0x310 [ 2190.400814] __generic_file_write_iter+0x2cd/0x5d0 [ 2190.401618] generic_file_write_iter+0xdb/0x230 [ 2190.402390] do_iter_readv_writev+0x476/0x750 [ 2190.403161] ? new_sync_write+0x660/0x660 [ 2190.403829] ? selinux_file_permission+0x92/0x520 [ 2190.404683] do_iter_write+0x191/0x670 [ 2190.405345] ? trace_hardirqs_on+0x5b/0x180 [ 2190.406071] vfs_iter_write+0x70/0xa0 [ 2190.406734] iter_file_splice_write+0x762/0xc30 [ 2190.407525] ? generic_splice_sendpage+0x140/0x140 [ 2190.408344] ? avc_policy_seqno+0x9/0x70 [ 2190.409017] ? selinux_file_permission+0x92/0x520 [ 2190.409826] ? lockdep_init_map_type+0x2c7/0x780 [ 2190.410665] ? generic_splice_sendpage+0x140/0x140 [ 2190.411501] direct_splice_actor+0x10f/0x170 [ 2190.412231] splice_direct_to_actor+0x387/0x980 [ 2190.413041] ? pipe_to_sendpage+0x380/0x380 [ 2190.413796] ? do_splice_to+0x160/0x160 [ 2190.414494] ? security_file_permission+0x24e/0x570 [ 2190.415363] do_splice_direct+0x1c4/0x290 [ 2190.416062] ? splice_direct_to_actor+0x980/0x980 [ 2190.416880] ? selinux_file_permission+0x92/0x520 [ 2190.417697] ? security_file_permission+0x24e/0x570 [ 2190.418537] do_sendfile+0x553/0x1090 [ 2190.419220] ? do_pwritev+0x270/0x270 [ 2190.419864] ? wait_for_completion_io+0x270/0x270 [ 2190.420706] ? rcu_read_lock_any_held+0x75/0xa0 [ 2190.421491] ? vfs_write+0x354/0xa70 [ 2190.422124] __x64_sys_sendfile64+0x1d1/0x210 [ 2190.422882] ? __ia32_sys_sendfile+0x220/0x220 [ 2190.423657] do_syscall_64+0x33/0x40 [ 2190.424278] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2190.425174] RIP: 0033:0x7fa3e7cb1b19 [ 2190.425818] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2190.428901] RSP: 002b:00007fa3e5227188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2190.430229] RAX: ffffffffffffffda RBX: 00007fa3e7dc4f60 RCX: 00007fa3e7cb1b19 [ 2190.431455] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000007 [ 2190.432675] RBP: 00007fa3e52271d0 R08: 0000000000000000 R09: 0000000000000000 [ 2190.433909] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2190.435137] R13: 00007ffdc063e89f R14: 00007fa3e5227300 R15: 0000000000022000 18:44:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000600) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:44:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:44:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:44:31 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x0, 0x0, 0x40000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:44:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000508) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:44:44 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000505) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:44:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:44:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100014006) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:44:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:44:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000509) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:44:44 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x0, 0x0, 0x200000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:44:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) [ 2203.664241] FAULT_INJECTION: forcing a failure. [ 2203.664241] name failslab, interval 1, probability 0, space 0, times 0 [ 2203.667043] CPU: 1 PID: 13432 Comm: syz-executor.0 Not tainted 5.10.194 #1 [ 2203.668461] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2203.670198] Call Trace: [ 2203.670744] dump_stack+0x107/0x167 [ 2203.671503] should_fail.cold+0x5/0xa [ 2203.672278] ? create_object.isra.0+0x3a/0xa20 [ 2203.673224] should_failslab+0x5/0x20 [ 2203.674017] kmem_cache_alloc+0x5b/0x310 [ 2203.674851] create_object.isra.0+0x3a/0xa20 [ 2203.675793] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2203.676846] kmem_cache_alloc+0x159/0x310 [ 2203.677696] ? release_pages+0x806/0xc20 [ 2203.678529] alloc_buffer_head+0x20/0x110 [ 2203.679383] alloc_page_buffers+0x14d/0x700 [ 2203.680290] create_empty_buffers+0x2c/0x640 [ 2203.681200] create_page_buffers+0x1bb/0x230 [ 2203.682115] __block_write_begin_int+0x1d1/0x19c0 [ 2203.683095] ? fat_add_cluster+0x100/0x100 [ 2203.683977] ? add_to_page_cache_locked+0x40/0x40 [ 2203.684986] ? __page_cache_alloc+0x10d/0x360 [ 2203.685907] ? remove_inode_buffers+0x300/0x300 [ 2203.686846] ? pagecache_get_page+0x243/0xc80 [ 2203.687787] ? wait_for_stable_page+0x92/0xe0 [ 2203.688724] cont_write_begin+0x472/0x980 [ 2203.689576] ? fat_add_cluster+0x100/0x100 [ 2203.690445] ? nobh_write_begin+0xed0/0xed0 [ 2203.691382] ? mark_held_locks+0x9e/0xe0 [ 2203.692223] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2203.693272] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2203.694337] fat_write_begin+0x89/0x180 [ 2203.695155] ? fat_add_cluster+0x100/0x100 [ 2203.696025] generic_perform_write+0x20a/0x4f0 [ 2203.696992] ? fat_direct_IO+0x1ef/0x380 [ 2203.697812] ? page_cache_next_miss+0x310/0x310 [ 2203.698792] __generic_file_write_iter+0x2cd/0x5d0 [ 2203.699800] generic_file_write_iter+0xdb/0x230 [ 2203.700786] ? mark_held_locks+0x9e/0xe0 [ 2203.701834] do_iter_readv_writev+0x476/0x750 [ 2203.702896] ? trace_hardirqs_on+0x5b/0x180 [ 2203.704018] ? new_sync_write+0x660/0x660 [ 2203.704955] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2203.706130] ? do_iter_write+0x117/0x670 [ 2203.707025] ? do_iter_write+0x121/0x670 [ 2203.707925] do_iter_write+0x191/0x670 [ 2203.708738] ? iov_iter_bvec+0x2e/0x130 [ 2203.709557] vfs_iter_write+0x70/0xa0 [ 2203.710343] iter_file_splice_write+0x762/0xc30 [ 2203.711302] ? generic_splice_sendpage+0x140/0x140 [ 2203.712319] ? avc_policy_seqno+0x9/0x70 [ 2203.713153] ? selinux_file_permission+0x92/0x520 [ 2203.714140] ? lockdep_init_map_type+0x2c7/0x780 [ 2203.715108] ? generic_splice_sendpage+0x140/0x140 [ 2203.716102] direct_splice_actor+0x10f/0x170 [ 2203.716994] splice_direct_to_actor+0x387/0x980 [ 2203.717961] ? pipe_to_sendpage+0x380/0x380 [ 2203.718846] ? do_splice_to+0x160/0x160 [ 2203.719675] ? security_file_permission+0x24e/0x570 [ 2203.720721] do_splice_direct+0x1c4/0x290 [ 2203.721569] ? splice_direct_to_actor+0x980/0x980 [ 2203.722603] ? selinux_file_permission+0x92/0x520 [ 2203.723639] ? security_file_permission+0x24e/0x570 [ 2203.724699] do_sendfile+0x553/0x1090 [ 2203.725499] ? do_pwritev+0x270/0x270 [ 2203.726291] ? wait_for_completion_io+0x270/0x270 [ 2203.727345] ? rcu_read_lock_any_held+0x75/0xa0 [ 2203.728332] ? vfs_write+0x354/0xa70 [ 2203.729135] __x64_sys_sendfile64+0x1d1/0x210 [ 2203.730074] ? __ia32_sys_sendfile+0x220/0x220 [ 2203.731054] do_syscall_64+0x33/0x40 [ 2203.731823] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2203.732899] RIP: 0033:0x7fa3e7cb1b19 [ 2203.733668] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2203.737404] RSP: 002b:00007fa3e5227188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2203.739004] RAX: ffffffffffffffda RBX: 00007fa3e7dc4f60 RCX: 00007fa3e7cb1b19 [ 2203.740484] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2203.741960] RBP: 00007fa3e52271d0 R08: 0000000000000000 R09: 0000000000000000 [ 2203.743398] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 2203.744847] R13: 00007ffdc063e89f R14: 00007fa3e5227300 R15: 0000000000022000 18:44:45 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x0, 0x0, 0x2000000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:44:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 11) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) [ 2204.028240] FAULT_INJECTION: forcing a failure. [ 2204.028240] name failslab, interval 1, probability 0, space 0, times 0 [ 2204.030942] CPU: 1 PID: 13463 Comm: syz-executor.0 Not tainted 5.10.194 #1 [ 2204.032358] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2204.034060] Call Trace: [ 2204.034613] dump_stack+0x107/0x167 [ 2204.035370] should_fail.cold+0x5/0xa [ 2204.036146] ? jbd2__journal_start+0x190/0x7e0 [ 2204.037092] should_failslab+0x5/0x20 [ 2204.037883] kmem_cache_alloc+0x5b/0x310 [ 2204.038714] jbd2__journal_start+0x190/0x7e0 [ 2204.039623] __ext4_journal_start_sb+0x214/0x390 [ 2204.040594] ext4_file_write_iter+0xdbf/0x18d0 [ 2204.041555] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2204.042472] ? kasan_save_stack+0x32/0x40 [ 2204.043313] ? kasan_save_stack+0x1b/0x40 [ 2204.044151] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2204.045180] ? iter_file_splice_write+0x16d/0xc30 [ 2204.046153] ? direct_splice_actor+0x10f/0x170 [ 2204.047076] ? splice_direct_to_actor+0x387/0x980 [ 2204.048048] ? do_splice_direct+0x1c4/0x290 [ 2204.048936] ? do_sendfile+0x553/0x1090 [ 2204.049745] ? __x64_sys_sendfile64+0x1d1/0x210 [ 2204.050690] do_iter_readv_writev+0x476/0x750 [ 2204.051608] ? new_sync_write+0x660/0x660 [ 2204.052448] ? selinux_file_permission+0x92/0x520 [ 2204.053446] do_iter_write+0x191/0x670 [ 2204.054239] ? trace_hardirqs_on+0x5b/0x180 [ 2204.055122] vfs_iter_write+0x70/0xa0 [ 2204.055902] iter_file_splice_write+0x762/0xc30 [ 2204.056867] ? generic_splice_sendpage+0x140/0x140 [ 2204.057862] ? avc_policy_seqno+0x9/0x70 [ 2204.058683] ? selinux_file_permission+0x92/0x520 [ 2204.059671] ? lockdep_init_map_type+0x2c7/0x780 [ 2204.060638] ? generic_splice_sendpage+0x140/0x140 [ 2204.061663] direct_splice_actor+0x10f/0x170 [ 2204.062562] splice_direct_to_actor+0x387/0x980 [ 2204.063503] ? pipe_to_sendpage+0x380/0x380 [ 2204.064380] ? do_splice_to+0x160/0x160 [ 2204.065201] ? security_file_permission+0x24e/0x570 [ 2204.066244] do_splice_direct+0x1c4/0x290 [ 2204.067087] ? splice_direct_to_actor+0x980/0x980 [ 2204.068067] ? selinux_file_permission+0x92/0x520 [ 2204.069059] ? security_file_permission+0x24e/0x570 [ 2204.070083] do_sendfile+0x553/0x1090 [ 2204.070856] ? do_pwritev+0x270/0x270 [ 2204.071644] ? wait_for_completion_io+0x270/0x270 [ 2204.072629] ? rcu_read_lock_any_held+0x75/0xa0 [ 2204.073580] ? vfs_write+0x354/0xa70 [ 2204.074337] __x64_sys_sendfile64+0x1d1/0x210 [ 2204.075249] ? __ia32_sys_sendfile+0x220/0x220 [ 2204.076181] do_syscall_64+0x33/0x40 [ 2204.076966] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2204.078009] RIP: 0033:0x7fa3e7cb1b19 [ 2204.078769] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2204.082482] RSP: 002b:00007fa3e5227188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2204.084025] RAX: ffffffffffffffda RBX: 00007fa3e7dc4f60 RCX: 00007fa3e7cb1b19 [ 2204.085473] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2204.086926] RBP: 00007fa3e52271d0 R08: 0000000000000000 R09: 0000000000000000 [ 2204.088371] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 2204.089824] R13: 00007ffdc063e89f R14: 00007fa3e5227300 R15: 0000000000022000 18:44:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 12) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:44:45 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000506) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) [ 2204.392690] FAULT_INJECTION: forcing a failure. [ 2204.392690] name failslab, interval 1, probability 0, space 0, times 0 [ 2204.395241] CPU: 1 PID: 13468 Comm: syz-executor.0 Not tainted 5.10.194 #1 [ 2204.396600] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2204.398251] Call Trace: [ 2204.398779] dump_stack+0x107/0x167 [ 2204.399493] should_fail.cold+0x5/0xa [ 2204.400237] ? create_object.isra.0+0x3a/0xa20 [ 2204.401154] should_failslab+0x5/0x20 [ 2204.401908] kmem_cache_alloc+0x5b/0x310 [ 2204.402711] create_object.isra.0+0x3a/0xa20 [ 2204.403588] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2204.404590] kmem_cache_alloc+0x159/0x310 [ 2204.405424] alloc_buffer_head+0x20/0x110 [ 2204.406238] alloc_page_buffers+0x14d/0x700 [ 2204.407100] create_empty_buffers+0x2c/0x640 [ 2204.408147] create_page_buffers+0x1bb/0x230 [ 2204.409041] __block_write_begin_int+0x1d1/0x19c0 [ 2204.409982] ? fat_add_cluster+0x100/0x100 [ 2204.410811] ? add_to_page_cache_locked+0x40/0x40 [ 2204.411751] ? __page_cache_alloc+0x10d/0x360 [ 2204.412626] ? remove_inode_buffers+0x300/0x300 [ 2204.413537] ? pagecache_get_page+0x243/0xc80 [ 2204.414412] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2204.415429] ? wait_for_stable_page+0x92/0xe0 [ 2204.416300] cont_write_begin+0x472/0x980 [ 2204.417134] ? fat_add_cluster+0x100/0x100 [ 2204.417956] ? nobh_write_begin+0xed0/0xed0 [ 2204.418794] ? __mark_inode_dirty+0x93b/0xd40 [ 2204.419665] ? lock_downgrade+0x6d0/0x6d0 [ 2204.420477] ? do_raw_spin_lock+0x121/0x260 [ 2204.421321] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2204.422306] ? rwlock_bug.part.0+0x90/0x90 [ 2204.423130] fat_write_begin+0x89/0x180 [ 2204.423901] ? fat_add_cluster+0x100/0x100 [ 2204.424740] generic_perform_write+0x20a/0x4f0 [ 2204.425629] ? fat_direct_IO+0x1ef/0x380 [ 2204.426412] ? page_cache_next_miss+0x310/0x310 [ 2204.427324] __generic_file_write_iter+0x2cd/0x5d0 [ 2204.428284] generic_file_write_iter+0xdb/0x230 [ 2204.429200] do_iter_readv_writev+0x476/0x750 [ 2204.430069] ? new_sync_write+0x660/0x660 [ 2204.430876] ? selinux_file_permission+0x92/0x520 [ 2204.431823] do_iter_write+0x191/0x670 [ 2204.432582] ? trace_hardirqs_on+0x5b/0x180 [ 2204.433484] vfs_iter_write+0x70/0xa0 [ 2204.434220] iter_file_splice_write+0x762/0xc30 [ 2204.435129] ? generic_splice_sendpage+0x140/0x140 [ 2204.436082] ? avc_policy_seqno+0x9/0x70 [ 2204.436884] ? selinux_file_permission+0x92/0x520 [ 2204.437821] ? lockdep_init_map_type+0x2c7/0x780 [ 2204.438746] ? generic_splice_sendpage+0x140/0x140 [ 2204.439692] direct_splice_actor+0x10f/0x170 [ 2204.440561] splice_direct_to_actor+0x387/0x980 [ 2204.441482] ? pipe_to_sendpage+0x380/0x380 [ 2204.442331] ? do_splice_to+0x160/0x160 [ 2204.443101] ? security_file_permission+0x24e/0x570 [ 2204.444074] do_splice_direct+0x1c4/0x290 [ 2204.444891] ? splice_direct_to_actor+0x980/0x980 [ 2204.445828] ? selinux_file_permission+0x92/0x520 [ 2204.446754] ? security_file_permission+0x24e/0x570 [ 2204.447721] do_sendfile+0x553/0x1090 [ 2204.448462] ? do_pwritev+0x270/0x270 [ 2204.449210] ? wait_for_completion_io+0x270/0x270 [ 2204.450137] ? rcu_read_lock_any_held+0x75/0xa0 [ 2204.451020] ? vfs_write+0x354/0xa70 [ 2204.451742] __x64_sys_sendfile64+0x1d1/0x210 [ 2204.452608] ? __ia32_sys_sendfile+0x220/0x220 [ 2204.453511] do_syscall_64+0x33/0x40 [ 2204.454249] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2204.455237] RIP: 0033:0x7fa3e7cb1b19 [ 2204.455954] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2204.459476] RSP: 002b:00007fa3e5227188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2204.460944] RAX: ffffffffffffffda RBX: 00007fa3e7dc4f60 RCX: 00007fa3e7cb1b19 [ 2204.462315] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2204.463682] RBP: 00007fa3e52271d0 R08: 0000000000000000 R09: 0000000000000000 [ 2204.465060] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 2204.466419] R13: 00007ffdc063e89f R14: 00007fa3e5227300 R15: 0000000000022000 18:45:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:45:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000509) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:01 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000507) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 13) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000050a) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:45:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100014007) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:01 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x0, 0x0, 0x40000000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) [ 2220.486296] FAULT_INJECTION: forcing a failure. [ 2220.486296] name failslab, interval 1, probability 0, space 0, times 0 [ 2220.489230] CPU: 1 PID: 13501 Comm: syz-executor.0 Not tainted 5.10.194 #1 [ 2220.490798] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2220.492662] Call Trace: [ 2220.493270] dump_stack+0x107/0x167 [ 2220.494092] should_fail.cold+0x5/0xa [ 2220.494956] ? create_object.isra.0+0x3a/0xa20 [ 2220.495968] should_failslab+0x5/0x20 [ 2220.496868] kmem_cache_alloc+0x5b/0x310 [ 2220.497809] create_object.isra.0+0x3a/0xa20 [ 2220.498809] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2220.499966] kmem_cache_alloc+0x159/0x310 [ 2220.500947] alloc_buffer_head+0x20/0x110 [ 2220.501908] alloc_page_buffers+0x14d/0x700 [ 2220.502907] create_empty_buffers+0x2c/0x640 [ 2220.503905] create_page_buffers+0x1bb/0x230 [ 2220.504962] __block_write_begin_int+0x1d1/0x19c0 [ 2220.506049] ? fat_add_cluster+0x100/0x100 [ 2220.506979] ? add_to_page_cache_locked+0x40/0x40 [ 2220.508061] ? __page_cache_alloc+0x10d/0x360 [ 2220.509092] ? remove_inode_buffers+0x300/0x300 [ 2220.510120] ? pagecache_get_page+0x243/0xc80 [ 2220.511123] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2220.512277] ? wait_for_stable_page+0x92/0xe0 [ 2220.513295] cont_write_begin+0x472/0x980 [ 2220.514243] ? fat_add_cluster+0x100/0x100 [ 2220.515175] ? nobh_write_begin+0xed0/0xed0 [ 2220.516112] ? __mark_inode_dirty+0x93b/0xd40 [ 2220.517117] ? lock_downgrade+0x6d0/0x6d0 [ 2220.518028] ? do_raw_spin_lock+0x121/0x260 [ 2220.518970] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2220.520120] ? rwlock_bug.part.0+0x90/0x90 [ 2220.521062] fat_write_begin+0x89/0x180 [ 2220.521931] ? fat_add_cluster+0x100/0x100 [ 2220.522851] generic_perform_write+0x20a/0x4f0 [ 2220.523853] ? fat_direct_IO+0x1ef/0x380 [ 2220.524749] ? page_cache_next_miss+0x310/0x310 [ 2220.525794] __generic_file_write_iter+0x2cd/0x5d0 [ 2220.526862] generic_file_write_iter+0xdb/0x230 [ 2220.527881] do_iter_readv_writev+0x476/0x750 [ 2220.528854] ? new_sync_write+0x660/0x660 [ 2220.529777] ? selinux_file_permission+0x92/0x520 [ 2220.530844] do_iter_write+0x191/0x670 [ 2220.531710] ? trace_hardirqs_on+0x5b/0x180 [ 2220.532699] vfs_iter_write+0x70/0xa0 [ 2220.533555] iter_file_splice_write+0x762/0xc30 [ 2220.534581] ? generic_splice_sendpage+0x140/0x140 [ 2220.535668] ? avc_policy_seqno+0x9/0x70 [ 2220.536538] ? selinux_file_permission+0x92/0x520 [ 2220.537606] ? lockdep_init_map_type+0x2c7/0x780 [ 2220.538649] ? generic_splice_sendpage+0x140/0x140 [ 2220.539676] direct_splice_actor+0x10f/0x170 [ 2220.540633] splice_direct_to_actor+0x387/0x980 [ 2220.541656] ? pipe_to_sendpage+0x380/0x380 [ 2220.542598] ? do_splice_to+0x160/0x160 [ 2220.543444] ? security_file_permission+0x24e/0x570 [ 2220.544532] do_splice_direct+0x1c4/0x290 [ 2220.545452] ? splice_direct_to_actor+0x980/0x980 [ 2220.546490] ? selinux_file_permission+0x92/0x520 [ 2220.547533] ? security_file_permission+0x24e/0x570 [ 2220.548595] do_sendfile+0x553/0x1090 [ 2220.549421] ? do_pwritev+0x270/0x270 [ 2220.550263] ? wait_for_completion_io+0x270/0x270 [ 2220.551323] ? rcu_read_lock_any_held+0x75/0xa0 [ 2220.552319] ? vfs_write+0x354/0xa70 [ 2220.553133] __x64_sys_sendfile64+0x1d1/0x210 [ 2220.554076] ? __ia32_sys_sendfile+0x220/0x220 [ 2220.555061] do_syscall_64+0x33/0x40 [ 2220.555849] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2220.556969] RIP: 0033:0x7fa3e7cb1b19 [ 2220.557773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2220.561664] RSP: 002b:00007fa3e5227188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2220.563299] RAX: ffffffffffffffda RBX: 00007fa3e7dc4f60 RCX: 00007fa3e7cb1b19 [ 2220.564826] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2220.566367] RBP: 00007fa3e52271d0 R08: 0000000000000000 R09: 0000000000000000 [ 2220.567896] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 2220.569403] R13: 00007ffdc063e89f R14: 00007fa3e5227300 R15: 0000000000022000 18:45:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 14) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:02 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x0, 0x0, 0x4000000000000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) [ 2220.956023] FAULT_INJECTION: forcing a failure. [ 2220.956023] name failslab, interval 1, probability 0, space 0, times 0 [ 2220.958592] CPU: 0 PID: 13522 Comm: syz-executor.0 Not tainted 5.10.194 #1 [ 2220.959843] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2220.961378] Call Trace: [ 2220.961889] dump_stack+0x107/0x167 [ 2220.962576] should_fail.cold+0x5/0xa [ 2220.963289] ? create_object.isra.0+0x3a/0xa20 [ 2220.964151] should_failslab+0x5/0x20 [ 2220.964902] kmem_cache_alloc+0x5b/0x310 [ 2220.965683] create_object.isra.0+0x3a/0xa20 [ 2220.966632] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2220.967596] kmem_cache_alloc+0x159/0x310 [ 2220.968381] alloc_buffer_head+0x20/0x110 [ 2220.969185] alloc_page_buffers+0x14d/0x700 [ 2220.970008] create_empty_buffers+0x2c/0x640 [ 2220.970819] create_page_buffers+0x1bb/0x230 [ 2220.971655] __block_write_begin_int+0x1d1/0x19c0 [ 2220.972564] ? fat_add_cluster+0x100/0x100 [ 2220.973333] ? add_to_page_cache_locked+0x40/0x40 [ 2220.974225] ? __page_cache_alloc+0x10d/0x360 [ 2220.975060] ? remove_inode_buffers+0x300/0x300 [ 2220.975909] ? pagecache_get_page+0x243/0xc80 [ 2220.976721] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2220.977701] ? wait_for_stable_page+0x92/0xe0 [ 2220.978530] cont_write_begin+0x472/0x980 [ 2220.979313] ? fat_add_cluster+0x100/0x100 [ 2220.980071] ? nobh_write_begin+0xed0/0xed0 [ 2220.980835] ? __mark_inode_dirty+0x93b/0xd40 [ 2220.981662] ? lock_downgrade+0x6d0/0x6d0 [ 2220.982403] ? do_raw_spin_lock+0x121/0x260 [ 2220.983206] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2220.984136] ? rwlock_bug.part.0+0x90/0x90 [ 2220.984917] fat_write_begin+0x89/0x180 [ 2220.985644] ? fat_add_cluster+0x100/0x100 [ 2220.986426] generic_perform_write+0x20a/0x4f0 [ 2220.987264] ? fat_direct_IO+0x1ef/0x380 [ 2220.988003] ? page_cache_next_miss+0x310/0x310 [ 2220.988879] __generic_file_write_iter+0x2cd/0x5d0 [ 2220.989785] generic_file_write_iter+0xdb/0x230 [ 2220.990641] do_iter_readv_writev+0x476/0x750 [ 2220.991468] ? new_sync_write+0x660/0x660 [ 2220.992225] ? selinux_file_permission+0x92/0x520 [ 2220.993136] do_iter_write+0x191/0x670 [ 2220.993858] ? trace_hardirqs_on+0x5b/0x180 [ 2220.994633] vfs_iter_write+0x70/0xa0 [ 2220.995342] iter_file_splice_write+0x762/0xc30 [ 2220.996199] ? generic_splice_sendpage+0x140/0x140 [ 2220.997123] ? avc_policy_seqno+0x9/0x70 [ 2220.997868] ? selinux_file_permission+0x92/0x520 [ 2220.998745] ? lockdep_init_map_type+0x2c7/0x780 [ 2220.999612] ? generic_splice_sendpage+0x140/0x140 [ 2221.000485] direct_splice_actor+0x10f/0x170 [ 2221.001286] splice_direct_to_actor+0x387/0x980 [ 2221.002116] ? pipe_to_sendpage+0x380/0x380 [ 2221.002880] ? do_splice_to+0x160/0x160 [ 2221.003583] ? security_file_permission+0x24e/0x570 [ 2221.004484] do_splice_direct+0x1c4/0x290 [ 2221.005256] ? splice_direct_to_actor+0x980/0x980 [ 2221.006114] ? selinux_file_permission+0x92/0x520 [ 2221.006977] ? security_file_permission+0x24e/0x570 [ 2221.007879] do_sendfile+0x553/0x1090 [ 2221.008578] ? do_pwritev+0x270/0x270 [ 2221.009277] ? wait_for_completion_io+0x270/0x270 [ 2221.010143] ? rcu_read_lock_any_held+0x75/0xa0 [ 2221.010968] ? vfs_write+0x354/0xa70 [ 2221.011644] __x64_sys_sendfile64+0x1d1/0x210 [ 2221.012466] ? __ia32_sys_sendfile+0x220/0x220 [ 2221.013330] do_syscall_64+0x33/0x40 [ 2221.013989] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2221.014951] RIP: 0033:0x7fa3e7cb1b19 [ 2221.015649] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2221.019067] RSP: 002b:00007fa3e5227188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2221.020464] RAX: ffffffffffffffda RBX: 00007fa3e7dc4f60 RCX: 00007fa3e7cb1b19 [ 2221.021735] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2221.022965] RBP: 00007fa3e52271d0 R08: 0000000000000000 R09: 0000000000000000 [ 2221.024210] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 2221.025472] R13: 00007ffdc063e89f R14: 00007fa3e5227300 R15: 0000000000022000 18:45:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000050a) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 15) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:02 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100014008) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) [ 2221.310739] FAULT_INJECTION: forcing a failure. [ 2221.310739] name failslab, interval 1, probability 0, space 0, times 0 [ 2221.312438] CPU: 0 PID: 13540 Comm: syz-executor.0 Not tainted 5.10.194 #1 [ 2221.313462] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2221.314627] Call Trace: [ 2221.315019] dump_stack+0x107/0x167 [ 2221.315563] should_fail.cold+0x5/0xa [ 2221.316128] ? create_object.isra.0+0x3a/0xa20 [ 2221.316790] should_failslab+0x5/0x20 [ 2221.317346] kmem_cache_alloc+0x5b/0x310 [ 2221.317951] create_object.isra.0+0x3a/0xa20 [ 2221.318600] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2221.319344] kmem_cache_alloc+0x159/0x310 [ 2221.319957] alloc_buffer_head+0x20/0x110 [ 2221.320566] alloc_page_buffers+0x14d/0x700 [ 2221.321203] create_empty_buffers+0x2c/0x640 [ 2221.321821] create_page_buffers+0x1bb/0x230 [ 2221.322461] __block_write_begin_int+0x1d1/0x19c0 [ 2221.323152] ? fat_add_cluster+0x100/0x100 [ 2221.323742] ? add_to_page_cache_locked+0x40/0x40 [ 2221.324394] ? __page_cache_alloc+0x10d/0x360 [ 2221.325027] ? remove_inode_buffers+0x300/0x300 [ 2221.325689] ? pagecache_get_page+0x243/0xc80 [ 2221.326337] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2221.327093] ? wait_for_stable_page+0x92/0xe0 [ 2221.327704] cont_write_begin+0x472/0x980 [ 2221.328270] ? fat_add_cluster+0x100/0x100 [ 2221.328879] ? nobh_write_begin+0xed0/0xed0 [ 2221.329499] ? __mark_inode_dirty+0x93b/0xd40 [ 2221.330105] ? lock_downgrade+0x6d0/0x6d0 [ 2221.330683] ? do_raw_spin_lock+0x121/0x260 [ 2221.331286] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2221.331973] ? rwlock_bug.part.0+0x90/0x90 [ 2221.332583] fat_write_begin+0x89/0x180 [ 2221.333132] ? fat_add_cluster+0x100/0x100 [ 2221.333746] generic_perform_write+0x20a/0x4f0 [ 2221.334385] ? fat_direct_IO+0x1ef/0x380 [ 2221.334950] ? page_cache_next_miss+0x310/0x310 [ 2221.335610] __generic_file_write_iter+0x2cd/0x5d0 [ 2221.336296] generic_file_write_iter+0xdb/0x230 [ 2221.336954] do_iter_readv_writev+0x476/0x750 [ 2221.337585] ? new_sync_write+0x660/0x660 [ 2221.338152] ? selinux_file_permission+0x92/0x520 [ 2221.338864] do_iter_write+0x191/0x670 [ 2221.339424] ? trace_hardirqs_on+0x5b/0x180 [ 2221.340012] vfs_iter_write+0x70/0xa0 [ 2221.340550] iter_file_splice_write+0x762/0xc30 [ 2221.341193] ? generic_splice_sendpage+0x140/0x140 [ 2221.341890] ? avc_policy_seqno+0x9/0x70 [ 2221.342463] ? selinux_file_permission+0x92/0x520 [ 2221.343139] ? lockdep_init_map_type+0x2c7/0x780 [ 2221.343811] ? generic_splice_sendpage+0x140/0x140 [ 2221.344477] direct_splice_actor+0x10f/0x170 [ 2221.345092] splice_direct_to_actor+0x387/0x980 [ 2221.345717] ? pipe_to_sendpage+0x380/0x380 [ 2221.346339] ? do_splice_to+0x160/0x160 [ 2221.346903] ? security_file_permission+0x24e/0x570 [ 2221.347577] do_splice_direct+0x1c4/0x290 [ 2221.348170] ? splice_direct_to_actor+0x980/0x980 [ 2221.348861] ? selinux_file_permission+0x92/0x520 [ 2221.349571] ? security_file_permission+0x24e/0x570 [ 2221.350261] do_sendfile+0x553/0x1090 [ 2221.350804] ? do_pwritev+0x270/0x270 [ 2221.351332] ? wait_for_completion_io+0x270/0x270 [ 2221.351979] ? rcu_read_lock_any_held+0x75/0xa0 [ 2221.352634] ? vfs_write+0x354/0xa70 [ 2221.353207] __x64_sys_sendfile64+0x1d1/0x210 [ 2221.353825] ? __ia32_sys_sendfile+0x220/0x220 [ 2221.354470] do_syscall_64+0x33/0x40 [ 2221.354997] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2221.355720] RIP: 0033:0x7fa3e7cb1b19 [ 2221.356222] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2221.358784] RSP: 002b:00007fa3e5227188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 18:45:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) [ 2221.360007] RAX: ffffffffffffffda RBX: 00007fa3e7dc4f60 RCX: 00007fa3e7cb1b19 [ 2221.361029] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2221.362052] RBP: 00007fa3e52271d0 R08: 0000000000000000 R09: 0000000000000000 [ 2221.363049] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 2221.364048] R13: 00007ffdc063e89f R14: 00007fa3e5227300 R15: 0000000000022000 18:45:02 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x0, 0x0, 0x20000000000000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:45:16 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 16) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100014009) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:45:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000600) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:45:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000600) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x0, 0x0, 0x200000000000000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:45:16 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000508) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) [ 2234.899701] FAULT_INJECTION: forcing a failure. [ 2234.899701] name failslab, interval 1, probability 0, space 0, times 0 [ 2234.902348] CPU: 1 PID: 13569 Comm: syz-executor.0 Not tainted 5.10.194 #1 [ 2234.903759] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2234.905449] Call Trace: [ 2234.905993] dump_stack+0x107/0x167 [ 2234.906739] should_fail.cold+0x5/0xa [ 2234.907515] ? create_object.isra.0+0x3a/0xa20 [ 2234.908489] should_failslab+0x5/0x20 [ 2234.909286] kmem_cache_alloc+0x5b/0x310 [ 2234.910133] create_object.isra.0+0x3a/0xa20 [ 2234.911031] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2234.912086] kmem_cache_alloc+0x159/0x310 [ 2234.912939] alloc_buffer_head+0x20/0x110 [ 2234.913787] alloc_page_buffers+0x14d/0x700 [ 2234.914686] create_empty_buffers+0x2c/0x640 [ 2234.915595] create_page_buffers+0x1bb/0x230 [ 2234.916486] __block_write_begin_int+0x1d1/0x19c0 [ 2234.917489] ? fat_add_cluster+0x100/0x100 [ 2234.918357] ? add_to_page_cache_locked+0x40/0x40 [ 2234.919334] ? __page_cache_alloc+0x10d/0x360 [ 2234.920252] ? lock_chain_count+0x20/0x20 [ 2234.921116] ? remove_inode_buffers+0x300/0x300 [ 2234.922067] ? pagecache_get_page+0x243/0xc80 [ 2234.922983] ? wait_for_stable_page+0x92/0xe0 [ 2234.923902] cont_write_begin+0x472/0x980 [ 2234.924760] ? fat_add_cluster+0x100/0x100 [ 2234.925635] ? nobh_write_begin+0xed0/0xed0 [ 2234.926524] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2234.927590] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2234.928670] ? trace_hardirqs_on+0x5b/0x180 [ 2234.929563] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2234.930655] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2234.931681] fat_write_begin+0x89/0x180 [ 2234.932481] ? fat_add_cluster+0x100/0x100 [ 2234.933348] generic_perform_write+0x20a/0x4f0 [ 2234.934277] ? fat_direct_IO+0x1ef/0x380 [ 2234.935094] ? page_cache_next_miss+0x310/0x310 [ 2234.936051] __generic_file_write_iter+0x2cd/0x5d0 [ 2234.937043] generic_file_write_iter+0xdb/0x230 [ 2234.938003] do_iter_readv_writev+0x476/0x750 [ 2234.938912] ? new_sync_write+0x660/0x660 [ 2234.939809] ? selinux_file_permission+0x92/0x520 [ 2234.940946] do_iter_write+0x191/0x670 [ 2234.941854] ? trace_hardirqs_on+0x5b/0x180 [ 2234.942866] vfs_iter_write+0x70/0xa0 [ 2234.943759] iter_file_splice_write+0x762/0xc30 [ 2234.944860] ? generic_splice_sendpage+0x140/0x140 [ 2234.946017] ? avc_policy_seqno+0x9/0x70 [ 2234.946951] ? selinux_file_permission+0x92/0x520 [ 2234.948078] ? lockdep_init_map_type+0x2c7/0x780 [ 2234.949201] ? generic_splice_sendpage+0x140/0x140 [ 2234.950337] direct_splice_actor+0x10f/0x170 [ 2234.951352] splice_direct_to_actor+0x387/0x980 [ 2234.952433] ? pipe_to_sendpage+0x380/0x380 [ 2234.953434] ? do_splice_to+0x160/0x160 [ 2234.954348] ? security_file_permission+0x24e/0x570 [ 2234.955506] do_splice_direct+0x1c4/0x290 [ 2234.956482] ? splice_direct_to_actor+0x980/0x980 [ 2234.957603] ? selinux_file_permission+0x92/0x520 [ 2234.958721] ? security_file_permission+0x24e/0x570 [ 2234.959892] do_sendfile+0x553/0x1090 [ 2234.960793] ? do_pwritev+0x270/0x270 [ 2234.961680] ? wait_for_completion_io+0x270/0x270 [ 2234.962795] ? rcu_read_lock_any_held+0x75/0xa0 [ 2234.963856] ? vfs_write+0x354/0xa70 [ 2234.964717] __x64_sys_sendfile64+0x1d1/0x210 [ 2234.965754] ? __ia32_sys_sendfile+0x220/0x220 [ 2234.966809] do_syscall_64+0x33/0x40 [ 2234.967664] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2234.968830] RIP: 0033:0x7fa3e7cb1b19 [ 2234.969698] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2234.973863] RSP: 002b:00007fa3e5227188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2234.975594] RAX: ffffffffffffffda RBX: 00007fa3e7dc4f60 RCX: 00007fa3e7cb1b19 [ 2234.977216] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2234.978820] RBP: 00007fa3e52271d0 R08: 0000000000000000 R09: 0000000000000000 [ 2234.980364] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 2234.981971] R13: 00007ffdc063e89f R14: 00007fa3e5227300 R15: 0000000000022000 18:45:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:45:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x0, 0x0, 0x4000000000000000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:45:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10001400a) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100008102) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100001405) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:45:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x0, 0x0, 0xffffffff00000000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:45:28 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 17) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:45:28 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000010) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:28 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000509) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) [ 2247.845880] FAULT_INJECTION: forcing a failure. [ 2247.845880] name failslab, interval 1, probability 0, space 0, times 0 [ 2247.848625] CPU: 1 PID: 13625 Comm: syz-executor.0 Not tainted 5.10.194 #1 [ 2247.850111] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2247.851816] Call Trace: [ 2247.852365] dump_stack+0x107/0x167 [ 2247.853106] should_fail.cold+0x5/0xa [ 2247.853911] ? create_object.isra.0+0x3a/0xa20 [ 2247.854837] should_failslab+0x5/0x20 [ 2247.855601] kmem_cache_alloc+0x5b/0x310 [ 2247.856420] create_object.isra.0+0x3a/0xa20 [ 2247.857311] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2247.858342] kmem_cache_alloc+0x159/0x310 [ 2247.859179] alloc_buffer_head+0x20/0x110 [ 2247.860008] alloc_page_buffers+0x14d/0x700 [ 2247.860888] create_empty_buffers+0x2c/0x640 [ 2247.861806] create_page_buffers+0x1bb/0x230 [ 2247.862693] __block_write_begin_int+0x1d1/0x19c0 [ 2247.863675] ? fat_add_cluster+0x100/0x100 [ 2247.864551] ? add_to_page_cache_locked+0x40/0x40 [ 2247.865550] ? __page_cache_alloc+0x10d/0x360 [ 2247.866457] ? remove_inode_buffers+0x300/0x300 [ 2247.867396] ? pagecache_get_page+0x243/0xc80 [ 2247.868303] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2247.869375] ? wait_for_stable_page+0x92/0xe0 [ 2247.870282] cont_write_begin+0x472/0x980 [ 2247.871133] ? fat_add_cluster+0x100/0x100 [ 2247.871988] ? nobh_write_begin+0xed0/0xed0 [ 2247.872860] ? __mark_inode_dirty+0x93b/0xd40 [ 2247.873793] ? lock_downgrade+0x6d0/0x6d0 [ 2247.874634] ? do_raw_spin_lock+0x121/0x260 [ 2247.875503] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2247.876536] ? rwlock_bug.part.0+0x90/0x90 [ 2247.877404] fat_write_begin+0x89/0x180 [ 2247.878205] ? fat_add_cluster+0x100/0x100 [ 2247.879063] generic_perform_write+0x20a/0x4f0 [ 2247.879991] ? fat_direct_IO+0x1ef/0x380 [ 2247.880811] ? page_cache_next_miss+0x310/0x310 [ 2247.881783] __generic_file_write_iter+0x2cd/0x5d0 [ 2247.882781] generic_file_write_iter+0xdb/0x230 [ 2247.883731] do_iter_readv_writev+0x476/0x750 [ 2247.884644] ? new_sync_write+0x660/0x660 [ 2247.885493] ? selinux_file_permission+0x92/0x520 [ 2247.886495] do_iter_write+0x191/0x670 [ 2247.887290] ? trace_hardirqs_on+0x5b/0x180 [ 2247.888170] vfs_iter_write+0x70/0xa0 [ 2247.888948] iter_file_splice_write+0x762/0xc30 [ 2247.889923] ? generic_splice_sendpage+0x140/0x140 [ 2247.890927] ? avc_policy_seqno+0x9/0x70 [ 2247.891744] ? selinux_file_permission+0x92/0x520 [ 2247.892725] ? lockdep_init_map_type+0x2c7/0x780 [ 2247.893692] ? generic_splice_sendpage+0x140/0x140 [ 2247.894682] direct_splice_actor+0x10f/0x170 [ 2247.895587] splice_direct_to_actor+0x387/0x980 [ 2247.896530] ? pipe_to_sendpage+0x380/0x380 [ 2247.897416] ? do_splice_to+0x160/0x160 [ 2247.898223] ? security_file_permission+0x24e/0x570 [ 2247.899245] do_splice_direct+0x1c4/0x290 [ 2247.900083] ? splice_direct_to_actor+0x980/0x980 [ 2247.901052] ? selinux_file_permission+0x92/0x520 [ 2247.902059] ? security_file_permission+0x24e/0x570 [ 2247.903078] do_sendfile+0x553/0x1090 [ 2247.903859] ? do_pwritev+0x270/0x270 [ 2247.904634] ? wait_for_completion_io+0x270/0x270 [ 2247.905618] ? rcu_read_lock_any_held+0x75/0xa0 [ 2247.906573] ? vfs_write+0x354/0xa70 [ 2247.907333] __x64_sys_sendfile64+0x1d1/0x210 [ 2247.908242] ? __ia32_sys_sendfile+0x220/0x220 [ 2247.909181] do_syscall_64+0x33/0x40 [ 2247.909962] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2247.910995] RIP: 0033:0x7fa3e7cb1b19 [ 2247.911746] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2247.915424] RSP: 002b:00007fa3e5227188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2247.916952] RAX: ffffffffffffffda RBX: 00007fa3e7dc4f60 RCX: 00007fa3e7cb1b19 [ 2247.918396] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2247.919828] RBP: 00007fa3e52271d0 R08: 0000000000000000 R09: 0000000000000000 [ 2247.921274] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 2247.922713] R13: 00007ffdc063e89f R14: 00007fa3e5227300 R15: 0000000000022000 18:45:29 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:45:29 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000050a) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100002fea) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:45:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100014005) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:29 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x2}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:45:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:45:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 18) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:45:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x1000403e4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000600) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:45:30 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x4}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) [ 2248.898180] FAULT_INJECTION: forcing a failure. [ 2248.898180] name failslab, interval 1, probability 0, space 0, times 0 [ 2248.900725] CPU: 0 PID: 13678 Comm: syz-executor.0 Not tainted 5.10.194 #1 [ 2248.902099] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2248.903711] Call Trace: [ 2248.904244] dump_stack+0x107/0x167 [ 2248.904964] should_fail.cold+0x5/0xa [ 2248.905719] ? mempool_alloc+0x148/0x360 [ 2248.906511] ? mempool_free_pages+0x20/0x20 [ 2248.907363] should_failslab+0x5/0x20 [ 2248.908108] kmem_cache_alloc+0x5b/0x310 [ 2248.908905] ? mempool_free_pages+0x20/0x20 [ 2248.909782] mempool_alloc+0x148/0x360 [ 2248.910552] ? mempool_resize+0x7d0/0x7d0 [ 2248.911371] ? lock_acquire+0x197/0x470 [ 2248.912147] ? lock_page_memcg+0x30/0x270 [ 2248.912960] ? find_held_lock+0x2c/0x110 [ 2248.913768] bio_alloc_bioset+0x36e/0x600 [ 2248.914573] ? lock_downgrade+0x6d0/0x6d0 [ 2248.915384] ? mark_buffer_dirty_inode+0x22b/0x300 [ 2248.916335] ? bvec_alloc+0x2f0/0x2f0 [ 2248.917114] ? do_raw_spin_lock+0x121/0x260 [ 2248.918007] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 2248.918977] write_dirty_buffer+0xcb/0x180 [ 2248.919858] fat_sync_bhs+0x6b/0x200 [ 2248.920609] fat_alloc_clusters+0xd1e/0xf30 [ 2248.921496] ? fat_ent_write+0x1a0/0x1a0 [ 2248.922301] ? __lock_acquire+0xbb1/0x5b00 [ 2248.923153] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2248.924165] ? lock_acquire+0x197/0x470 [ 2248.924940] fat_add_cluster+0x6d/0x100 [ 2248.925735] ? fat_fill_super+0x36e0/0x36e0 [ 2248.926580] ? fat_bmap+0x200/0x460 [ 2248.927289] fat_get_block+0x5b3/0x940 [ 2248.928055] ? fat_add_cluster+0x100/0x100 [ 2248.928869] ? create_empty_buffers+0x4a3/0x640 [ 2248.929821] ? create_page_buffers+0x139/0x230 [ 2248.930708] __block_write_begin_int+0x3d1/0x19c0 [ 2248.931639] ? fat_add_cluster+0x100/0x100 [ 2248.932468] ? remove_inode_buffers+0x300/0x300 [ 2248.933391] ? pagecache_get_page+0x243/0xc80 [ 2248.934256] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2248.935290] ? wait_for_stable_page+0x92/0xe0 [ 2248.936156] cont_write_begin+0x472/0x980 [ 2248.936974] ? fat_add_cluster+0x100/0x100 [ 2248.937802] ? nobh_write_begin+0xed0/0xed0 [ 2248.938632] ? __mark_inode_dirty+0x93b/0xd40 [ 2248.939515] ? lock_downgrade+0x6d0/0x6d0 [ 2248.940327] ? do_raw_spin_lock+0x121/0x260 [ 2248.941158] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2248.942162] ? rwlock_bug.part.0+0x90/0x90 [ 2248.942982] fat_write_begin+0x89/0x180 [ 2248.943773] ? fat_add_cluster+0x100/0x100 [ 2248.944604] generic_perform_write+0x20a/0x4f0 [ 2248.945507] ? fat_direct_IO+0x1ef/0x380 [ 2248.946287] ? page_cache_next_miss+0x310/0x310 [ 2248.947210] __generic_file_write_iter+0x2cd/0x5d0 [ 2248.948176] generic_file_write_iter+0xdb/0x230 [ 2248.949092] do_iter_readv_writev+0x476/0x750 [ 2248.949982] ? new_sync_write+0x660/0x660 [ 2248.950789] ? selinux_file_permission+0x92/0x520 [ 2248.951753] do_iter_write+0x191/0x670 [ 2248.952503] ? trace_hardirqs_on+0x5b/0x180 [ 2248.953360] vfs_iter_write+0x70/0xa0 [ 2248.954112] iter_file_splice_write+0x762/0xc30 [ 2248.955045] ? generic_splice_sendpage+0x140/0x140 [ 2248.956008] ? avc_policy_seqno+0x9/0x70 [ 2248.956814] ? selinux_file_permission+0x92/0x520 [ 2248.957783] ? lockdep_init_map_type+0x2c7/0x780 [ 2248.958724] ? generic_splice_sendpage+0x140/0x140 [ 2248.959672] direct_splice_actor+0x10f/0x170 [ 2248.960542] splice_direct_to_actor+0x387/0x980 [ 2248.961459] ? pipe_to_sendpage+0x380/0x380 [ 2248.962314] ? do_splice_to+0x160/0x160 [ 2248.963082] ? security_file_permission+0x24e/0x570 [ 2248.964068] do_splice_direct+0x1c4/0x290 [ 2248.964872] ? splice_direct_to_actor+0x980/0x980 [ 2248.965833] ? selinux_file_permission+0x92/0x520 [ 2248.966769] ? security_file_permission+0x24e/0x570 [ 2248.967756] do_sendfile+0x553/0x1090 [ 2248.968506] ? do_pwritev+0x270/0x270 [ 2248.969270] ? wait_for_completion_io+0x270/0x270 [ 2248.970204] ? rcu_read_lock_any_held+0x75/0xa0 [ 2248.971112] ? vfs_write+0x354/0xa70 [ 2248.971841] __x64_sys_sendfile64+0x1d1/0x210 [ 2248.972723] ? __ia32_sys_sendfile+0x220/0x220 [ 2248.973647] do_syscall_64+0x33/0x40 [ 2248.974382] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2248.975378] RIP: 0033:0x7fa3e7cb1b19 [ 2248.976114] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2248.979639] RSP: 002b:00007fa3e5227188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2248.981114] RAX: ffffffffffffffda RBX: 00007fa3e7dc4f60 RCX: 00007fa3e7cb1b19 [ 2248.982488] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2248.983867] RBP: 00007fa3e52271d0 R08: 0000000000000000 R09: 0000000000000000 [ 2248.985226] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 2248.986613] R13: 00007ffdc063e89f R14: 00007fa3e5227300 R15: 0000000000022000 18:45:30 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000600) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:43 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100002fea) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100002ff0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:45:43 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:45:43 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x2000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:45:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100014006) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={r2, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x1000403ec) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:43 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x4000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:45:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x1000403ed) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100002ff2) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:45:44 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:45:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:45:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100002ff5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:45:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000011) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:45:58 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100002fef) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000002) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100014007) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:58 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x200000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:45:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x1000403f7) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:58 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x2000000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:45:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100014008) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000003) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:45:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:45:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x40000000}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:45:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100002ffc) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:45:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x1000004f9) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:46:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000003) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100014009) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100002ffd) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:46:15 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:46:15 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100002ff2) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x1000403f8) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000004) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) 18:46:15 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}, 0x2}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:46:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}, 0x4}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:46:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x10001400a) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}, 0x2000}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:46:16 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000005) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, 0x0) 18:46:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000003) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000005) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x1000fffff) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, 0x0) 18:46:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100002fff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:46:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100040402) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:30 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100002ff3) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:30 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}, 0x4000}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:46:30 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000006) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:30 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}, 0x40000}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:46:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x10fffffff) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:31 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}, 0x200000}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:46:31 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100003005) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:46:31 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100002ff6) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, 0x0) 18:46:31 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}, 0x2000000}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:46:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000005) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000007) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100040403) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:31 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}, 0x40000000}], 0x500, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:46:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x0, 0x1e4}) 18:46:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, 0x0) 18:46:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100040410) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000008) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x0, 0x1e4}) 18:46:45 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100002ff8) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:45 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x2, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:46:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3000, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000240)={0x3c, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x4}]}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) lseek(r2, 0x0, 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x200f5ef, 0x0) openat(r3, &(0x7f0000000200)='./file1\x00', 0x101000, 0x1c1) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000300)=ANY=[@ANYBLOB="0100"/20, @ANYRES32=r0, @ANYBLOB="969d0000000000002e2f66696c653000"]) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r4, 0xd000941e, &(0x7f0000000800)={r5, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100003006) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:46:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100040411) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x40, 0x10) openat2(r0, &(0x7f0000000200)='.\x00', &(0x7f0000000240)={0x20, 0x20, 0xf}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r1, r2, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x9d96}}, './file0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r3, 0xd000941e, &(0x7f0000000800)={r4, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:58 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100002ff9) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100003007) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:46:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100040410) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100040419) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000009) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x0, 0x1e4}) 18:46:58 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x3, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:46:58 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x4, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:46:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x5, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:46:59 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100002ffa) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x10000000a) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100014008) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100003015) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:46:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x6, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:46:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x7, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:46:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="2b00000011000000f2fc8eb9", @ANYRES32=r0, @ANYBLOB="969d0000000000002e2f66696c653000"]) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10004041a) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x8, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:46:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:46:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000010) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:46:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x9, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:47:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000200)='./file2\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100014006) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:47:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100040427) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:47:14 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x10000000b) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:14 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100002fff) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:14 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000010) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:14 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0xa, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:47:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100002fff) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:27 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0xb, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:47:27 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000300c) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100040428) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="969d0061ff2dbc000000253000"]) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:27 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x10000000d) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100014007) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:47:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000000d) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:27 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0xc, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:47:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:47:27 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0xd, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:47:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10004042d) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000000d) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) [ 2366.853396] FAULT_INJECTION: forcing a failure. [ 2366.853396] name failslab, interval 1, probability 0, space 0, times 0 [ 2366.854751] CPU: 0 PID: 14271 Comm: syz-executor.2 Not tainted 5.10.194 #1 [ 2366.855556] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2366.856441] Call Trace: [ 2366.856751] dump_stack+0x107/0x167 [ 2366.857161] should_fail.cold+0x5/0xa [ 2366.857598] ? alloc_pipe_info+0x10a/0x590 [ 2366.858091] should_failslab+0x5/0x20 [ 2366.858516] kmem_cache_alloc_trace+0x55/0x320 [ 2366.859051] alloc_pipe_info+0x10a/0x590 [ 2366.859517] splice_direct_to_actor+0x774/0x980 [ 2366.860060] ? _cond_resched+0x12/0x80 [ 2366.860471] ? inode_security+0x107/0x140 [ 2366.860943] ? pipe_to_sendpage+0x380/0x380 [ 2366.861434] ? selinux_file_permission+0x92/0x520 [ 2366.861975] ? do_splice_to+0x160/0x160 [ 2366.862415] ? security_file_permission+0x24e/0x570 [ 2366.862997] do_splice_direct+0x1c4/0x290 [ 2366.863458] ? splice_direct_to_actor+0x980/0x980 [ 2366.864008] ? selinux_file_permission+0x92/0x520 [ 2366.864549] ? security_file_permission+0x24e/0x570 [ 2366.865120] do_sendfile+0x553/0x1090 [ 2366.865528] ? do_pwritev+0x270/0x270 [ 2366.865967] ? wait_for_completion_io+0x270/0x270 [ 2366.866528] ? rcu_read_lock_any_held+0x75/0xa0 [ 2366.867073] ? vfs_write+0x354/0xa70 [ 2366.867508] __x64_sys_sendfile64+0x1d1/0x210 [ 2366.868030] ? __ia32_sys_sendfile+0x220/0x220 [ 2366.868565] do_syscall_64+0x33/0x40 [ 2366.869002] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2366.869586] RIP: 0033:0x7f103d63db19 [ 2366.869980] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2366.872109] RSP: 002b:00007f103abb3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2366.872985] RAX: ffffffffffffffda RBX: 00007f103d750f60 RCX: 00007f103d63db19 [ 2366.873805] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2366.874622] RBP: 00007f103abb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2366.875377] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2366.876196] R13: 00007ffe430675cf R14: 00007f103abb3300 R15: 0000000000022000 18:47:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0xe, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:47:28 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x10000000f) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100014008) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:47:28 executing program 4: ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0xfffffffffffffff7, 0x7, 0x494, 0xff}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a40}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) write$P9_RREADLINK(r0, &(0x7f00000001c0)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:28 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 2) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:47:28 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000300e) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10004042e) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0xf, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) [ 2367.238742] FAULT_INJECTION: forcing a failure. [ 2367.238742] name failslab, interval 1, probability 0, space 0, times 0 [ 2367.241192] CPU: 1 PID: 14303 Comm: syz-executor.2 Not tainted 5.10.194 #1 [ 2367.242580] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2367.244257] Call Trace: [ 2367.244791] dump_stack+0x107/0x167 [ 2367.245525] should_fail.cold+0x5/0xa [ 2367.246287] ? create_object.isra.0+0x3a/0xa20 [ 2367.247211] should_failslab+0x5/0x20 [ 2367.247971] kmem_cache_alloc+0x5b/0x310 [ 2367.248791] create_object.isra.0+0x3a/0xa20 [ 2367.249670] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2367.250692] kmem_cache_alloc_trace+0x151/0x320 [ 2367.251644] alloc_pipe_info+0x10a/0x590 [ 2367.252459] splice_direct_to_actor+0x774/0x980 [ 2367.253388] ? _cond_resched+0x12/0x80 [ 2367.254164] ? inode_security+0x107/0x140 [ 2367.255001] ? pipe_to_sendpage+0x380/0x380 [ 2367.255860] ? selinux_file_permission+0x92/0x520 [ 2367.256828] ? do_splice_to+0x160/0x160 [ 2367.257626] ? security_file_permission+0x24e/0x570 [ 2367.258644] do_splice_direct+0x1c4/0x290 [ 2367.259485] ? splice_direct_to_actor+0x980/0x980 [ 2367.260451] ? selinux_file_permission+0x92/0x520 [ 2367.261445] ? security_file_permission+0x24e/0x570 [ 2367.262470] do_sendfile+0x553/0x1090 [ 2367.263275] ? do_pwritev+0x270/0x270 [ 2367.264046] ? wait_for_completion_io+0x270/0x270 [ 2367.265014] ? rcu_read_lock_any_held+0x75/0xa0 [ 2367.265955] ? vfs_write+0x354/0xa70 [ 2367.266714] __x64_sys_sendfile64+0x1d1/0x210 [ 2367.267636] ? __ia32_sys_sendfile+0x220/0x220 [ 2367.268564] do_syscall_64+0x33/0x40 [ 2367.269313] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2367.270350] RIP: 0033:0x7f103d63db19 [ 2367.271123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2367.274815] RSP: 002b:00007f103abb3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2367.276345] RAX: ffffffffffffffda RBX: 00007f103d750f60 RCX: 00007f103d63db19 [ 2367.277770] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2367.279203] RBP: 00007f103abb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2367.280631] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2367.282056] R13: 00007ffe430675cf R14: 00007f103abb3300 R15: 0000000000022000 18:47:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x10, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:47:28 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000010) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100040437) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100014009) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:47:43 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000011) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000300e) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:43 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x11, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:47:43 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100008102) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(r0, &(0x7f00000001c0)='./file0\x00', 0x545000, 0x34) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 3) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) [ 2382.788265] FAULT_INJECTION: forcing a failure. [ 2382.788265] name failslab, interval 1, probability 0, space 0, times 0 [ 2382.790181] CPU: 1 PID: 14359 Comm: syz-executor.2 Not tainted 5.10.194 #1 [ 2382.791259] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2382.792536] Call Trace: [ 2382.792973] dump_stack+0x107/0x167 [ 2382.793561] should_fail.cold+0x5/0xa [ 2382.794164] ? alloc_pipe_info+0x1e5/0x590 [ 2382.794861] should_failslab+0x5/0x20 [ 2382.795461] __kmalloc+0x72/0x390 [ 2382.796005] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2382.796787] alloc_pipe_info+0x1e5/0x590 [ 2382.797434] splice_direct_to_actor+0x774/0x980 [ 2382.798177] ? _cond_resched+0x12/0x80 [ 2382.798782] ? inode_security+0x107/0x140 [ 2382.799436] ? pipe_to_sendpage+0x380/0x380 [ 2382.800102] ? selinux_file_permission+0x92/0x520 [ 2382.800856] ? do_splice_to+0x160/0x160 [ 2382.801470] ? security_file_permission+0x24e/0x570 [ 2382.802240] do_splice_direct+0x1c4/0x290 [ 2382.802869] ? splice_direct_to_actor+0x980/0x980 [ 2382.803622] ? selinux_file_permission+0x92/0x520 [ 2382.804354] ? security_file_permission+0x24e/0x570 [ 2382.805119] do_sendfile+0x553/0x1090 [ 2382.805712] ? do_pwritev+0x270/0x270 [ 2382.806298] ? wait_for_completion_io+0x270/0x270 [ 2382.807036] ? rcu_read_lock_any_held+0x75/0xa0 [ 2382.807739] ? vfs_write+0x354/0xa70 [ 2382.808311] __x64_sys_sendfile64+0x1d1/0x210 [ 2382.808992] ? __ia32_sys_sendfile+0x220/0x220 [ 2382.809702] do_syscall_64+0x33/0x40 [ 2382.810280] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2382.811065] RIP: 0033:0x7f103d63db19 [ 2382.811638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2382.814428] RSP: 002b:00007f103abb3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2382.815598] RAX: ffffffffffffffda RBX: 00007f103d750f60 RCX: 00007f103d63db19 [ 2382.816681] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2382.817759] RBP: 00007f103abb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2382.818841] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2382.819922] R13: 00007ffe430675cf R14: 00007f103abb3300 R15: 0000000000022000 18:47:44 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x12, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:47:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 4) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:47:44 executing program 3: ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0xfffffffffffffff7, 0x7, 0x494, 0xff}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a40}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) write$P9_RREADLINK(r0, &(0x7f00000001c0)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) [ 2383.114305] FAULT_INJECTION: forcing a failure. [ 2383.114305] name failslab, interval 1, probability 0, space 0, times 0 [ 2383.116926] CPU: 0 PID: 14377 Comm: syz-executor.2 Not tainted 5.10.194 #1 [ 2383.118356] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2383.120120] Call Trace: [ 2383.120697] dump_stack+0x107/0x167 [ 2383.121471] should_fail.cold+0x5/0xa [ 2383.122285] ? create_object.isra.0+0x3a/0xa20 [ 2383.123314] should_failslab+0x5/0x20 [ 2383.124123] kmem_cache_alloc+0x5b/0x310 [ 2383.125084] create_object.isra.0+0x3a/0xa20 [ 2383.126260] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2383.127604] __kmalloc+0x16e/0x390 [ 2383.128560] alloc_pipe_info+0x1e5/0x590 [ 2383.129627] splice_direct_to_actor+0x774/0x980 [ 2383.130735] ? _cond_resched+0x12/0x80 [ 2383.131758] ? inode_security+0x107/0x140 [ 2383.132745] ? pipe_to_sendpage+0x380/0x380 [ 2383.133722] ? selinux_file_permission+0x92/0x520 [ 2383.134874] ? do_splice_to+0x160/0x160 [ 2383.135892] ? security_file_permission+0x24e/0x570 [ 2383.137109] do_splice_direct+0x1c4/0x290 [ 2383.138062] ? splice_direct_to_actor+0x980/0x980 [ 2383.139133] ? selinux_file_permission+0x92/0x520 [ 2383.140174] ? security_file_permission+0x24e/0x570 [ 2383.141261] do_sendfile+0x553/0x1090 [ 2383.142121] ? do_pwritev+0x270/0x270 [ 2383.142921] ? wait_for_completion_io+0x270/0x270 [ 2383.143927] ? rcu_read_lock_any_held+0x75/0xa0 [ 2383.144844] ? vfs_write+0x354/0xa70 [ 2383.145607] __x64_sys_sendfile64+0x1d1/0x210 [ 2383.146499] ? __ia32_sys_sendfile+0x220/0x220 [ 2383.147409] do_syscall_64+0x33/0x40 [ 2383.148155] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2383.149153] RIP: 0033:0x7f103d63db19 [ 2383.149885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2383.153494] RSP: 002b:00007f103abb3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2383.155002] RAX: ffffffffffffffda RBX: 00007f103d750f60 RCX: 00007f103d63db19 [ 2383.156397] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2383.157818] RBP: 00007f103abb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2383.159234] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2383.160657] R13: 00007ffe430675cf R14: 00007f103abb3300 R15: 0000000000022000 18:47:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:47:58 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x13, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:47:58 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100008239) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10001400a) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:47:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 1) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100040438) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000112) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="5101006f8d01000000180000", @ANYRES32=r0, @ANYBLOB="969d0000000000002e2f66696c653000"]) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) [ 2397.436224] FAULT_INJECTION: forcing a failure. [ 2397.436224] name failslab, interval 1, probability 0, space 0, times 0 [ 2397.438727] CPU: 1 PID: 14398 Comm: syz-executor.2 Not tainted 5.10.194 #1 [ 2397.440213] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2397.441935] Call Trace: [ 2397.442499] dump_stack+0x107/0x167 [ 2397.443265] should_fail.cold+0x5/0xa [ 2397.444074] ? iter_file_splice_write+0x16d/0xc30 [ 2397.445105] should_failslab+0x5/0x20 [ 2397.445873] __kmalloc+0x72/0x390 [ 2397.446613] iter_file_splice_write+0x16d/0xc30 [ 2397.447607] ? atime_needs_update+0x600/0x600 [ 2397.448574] ? generic_splice_sendpage+0x140/0x140 [ 2397.449615] ? pipe_to_user+0x170/0x170 [ 2397.450438] ? _cond_resched+0x12/0x80 [ 2397.451281] ? avc_policy_seqno+0x9/0x70 [ 2397.452132] ? selinux_file_permission+0x92/0x520 [ 2397.453145] ? lockdep_init_map_type+0x2c7/0x780 [ 2397.454122] ? generic_splice_sendpage+0x140/0x140 [ 2397.455116] direct_splice_actor+0x10f/0x170 [ 2397.456029] splice_direct_to_actor+0x387/0x980 [ 2397.456956] ? pipe_to_sendpage+0x380/0x380 [ 2397.457813] ? do_splice_to+0x160/0x160 [ 2397.458616] ? security_file_permission+0x24e/0x570 [ 2397.459631] do_splice_direct+0x1c4/0x290 [ 2397.460469] ? splice_direct_to_actor+0x980/0x980 [ 2397.461453] ? selinux_file_permission+0x92/0x520 [ 2397.462442] ? security_file_permission+0x24e/0x570 [ 2397.463483] do_sendfile+0x553/0x1090 [ 2397.464271] ? do_pwritev+0x270/0x270 [ 2397.465043] ? wait_for_completion_io+0x270/0x270 [ 2397.466033] ? rcu_read_lock_any_held+0x75/0xa0 [ 2397.467008] ? vfs_write+0x354/0xa70 [ 2397.467784] __x64_sys_sendfile64+0x1d1/0x210 [ 2397.468691] ? __ia32_sys_sendfile+0x220/0x220 [ 2397.469616] do_syscall_64+0x33/0x40 [ 2397.470358] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2397.471393] RIP: 0033:0x7f103d63db19 [ 2397.472166] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2397.475911] RSP: 002b:00007f103abb3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2397.477456] RAX: ffffffffffffffda RBX: 00007f103d750f60 RCX: 00007f103d63db19 [ 2397.478894] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2397.480372] RBP: 00007f103abb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2397.481820] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2397.483267] R13: 00007ffe430675cf R14: 00007f103abb3300 R15: 0000000000022000 [ 2397.524107] FAULT_INJECTION: forcing a failure. [ 2397.524107] name failslab, interval 1, probability 0, space 0, times 0 [ 2397.526756] CPU: 0 PID: 14412 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2397.528184] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2397.529916] Call Trace: [ 2397.530489] dump_stack+0x107/0x167 [ 2397.531275] should_fail.cold+0x5/0xa [ 2397.532075] ? alloc_pipe_info+0x10a/0x590 [ 2397.532959] should_failslab+0x5/0x20 [ 2397.533742] kmem_cache_alloc_trace+0x55/0x320 [ 2397.534699] alloc_pipe_info+0x10a/0x590 [ 2397.535559] splice_direct_to_actor+0x774/0x980 [ 2397.536520] ? _cond_resched+0x12/0x80 [ 2397.537325] ? inode_security+0x107/0x140 [ 2397.538183] ? pipe_to_sendpage+0x380/0x380 [ 2397.539074] ? selinux_file_permission+0x92/0x520 [ 2397.540098] ? do_splice_to+0x160/0x160 [ 2397.540899] ? security_file_permission+0x24e/0x570 [ 2397.541928] do_splice_direct+0x1c4/0x290 [ 2397.542772] ? splice_direct_to_actor+0x980/0x980 [ 2397.543784] ? selinux_file_permission+0x92/0x520 [ 2397.544786] ? security_file_permission+0x24e/0x570 [ 2397.545829] do_sendfile+0x553/0x1090 [ 2397.546602] ? do_pwritev+0x270/0x270 [ 2397.547386] ? wait_for_completion_io+0x270/0x270 [ 2397.548337] ? rcu_read_lock_any_held+0x75/0xa0 [ 2397.549300] ? vfs_write+0x354/0xa70 [ 2397.550077] __x64_sys_sendfile64+0x1d1/0x210 [ 2397.551000] ? __ia32_sys_sendfile+0x220/0x220 [ 2397.551954] do_syscall_64+0x33/0x40 [ 2397.552733] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2397.553776] RIP: 0033:0x7f65e458eb19 [ 2397.554546] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2397.558349] RSP: 002b:00007f65e1b04188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2397.559925] RAX: ffffffffffffffda RBX: 00007f65e46a1f60 RCX: 00007f65e458eb19 [ 2397.561385] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2397.562852] RBP: 00007f65e1b041d0 R08: 0000000000000000 R09: 0000000000000000 [ 2397.564309] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2397.565765] R13: 00007fff69f4ef1f R14: 00007f65e1b04300 R15: 0000000000022000 18:47:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 6) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:47:58 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x14, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:47:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 2) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) [ 2397.797628] FAULT_INJECTION: forcing a failure. [ 2397.797628] name failslab, interval 1, probability 0, space 0, times 0 [ 2397.801210] CPU: 0 PID: 14435 Comm: syz-executor.2 Not tainted 5.10.194 #1 [ 2397.802648] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2397.804363] Call Trace: [ 2397.804913] dump_stack+0x107/0x167 [ 2397.805680] should_fail.cold+0x5/0xa [ 2397.806458] ? create_object.isra.0+0x3a/0xa20 [ 2397.807393] ? create_object.isra.0+0x3a/0xa20 [ 2397.808335] should_failslab+0x5/0x20 [ 2397.809120] kmem_cache_alloc+0x5b/0x310 [ 2397.809953] create_object.isra.0+0x3a/0xa20 [ 2397.810845] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2397.811895] __kmalloc+0x16e/0x390 [ 2397.812638] iter_file_splice_write+0x16d/0xc30 [ 2397.813586] ? atime_needs_update+0x600/0x600 [ 2397.814537] ? generic_splice_sendpage+0x140/0x140 [ 2397.815563] ? pipe_to_user+0x170/0x170 [ 2397.816380] ? _cond_resched+0x12/0x80 [ 2397.817182] ? avc_policy_seqno+0x9/0x70 [ 2397.818008] ? selinux_file_permission+0x92/0x520 [ 2397.819001] ? lockdep_init_map_type+0x2c7/0x780 [ 2397.819992] ? generic_splice_sendpage+0x140/0x140 [ 2397.820986] direct_splice_actor+0x10f/0x170 [ 2397.821876] splice_direct_to_actor+0x387/0x980 [ 2397.822825] ? pipe_to_sendpage+0x380/0x380 [ 2397.823721] ? do_splice_to+0x160/0x160 [ 2397.824533] ? security_file_permission+0x24e/0x570 [ 2397.825549] do_splice_direct+0x1c4/0x290 [ 2397.826392] ? splice_direct_to_actor+0x980/0x980 [ 2397.827377] ? selinux_file_permission+0x92/0x520 [ 2397.828362] ? security_file_permission+0x24e/0x570 [ 2397.829390] do_sendfile+0x553/0x1090 [ 2397.830168] ? do_pwritev+0x270/0x270 [ 2397.830949] ? wait_for_completion_io+0x270/0x270 [ 2397.831939] ? rcu_read_lock_any_held+0x75/0xa0 [ 2397.832884] ? vfs_write+0x354/0xa70 [ 2397.833665] __x64_sys_sendfile64+0x1d1/0x210 [ 2397.834569] ? __ia32_sys_sendfile+0x220/0x220 [ 2397.835531] do_syscall_64+0x33/0x40 [ 2397.836287] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2397.837319] RIP: 0033:0x7f103d63db19 [ 2397.838069] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2397.841766] RSP: 002b:00007f103abb3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2397.843314] RAX: ffffffffffffffda RBX: 00007f103d750f60 RCX: 00007f103d63db19 [ 2397.844768] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2397.846210] RBP: 00007f103abb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2397.847670] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2397.849098] R13: 00007ffe430675cf R14: 00007f103abb3300 R15: 0000000000022000 [ 2397.979323] FAULT_INJECTION: forcing a failure. [ 2397.979323] name failslab, interval 1, probability 0, space 0, times 0 [ 2397.981733] CPU: 1 PID: 14437 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2397.983249] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2397.984960] Call Trace: [ 2397.985530] dump_stack+0x107/0x167 [ 2397.986294] should_fail.cold+0x5/0xa [ 2397.987124] ? create_object.isra.0+0x3a/0xa20 [ 2397.988148] should_failslab+0x5/0x20 [ 2397.988961] kmem_cache_alloc+0x5b/0x310 [ 2397.989802] create_object.isra.0+0x3a/0xa20 [ 2397.990722] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2397.991772] kmem_cache_alloc_trace+0x151/0x320 [ 2397.992752] alloc_pipe_info+0x10a/0x590 [ 2397.993609] splice_direct_to_actor+0x774/0x980 [ 2397.994572] ? _cond_resched+0x12/0x80 [ 2397.995381] ? inode_security+0x107/0x140 [ 2397.996241] ? pipe_to_sendpage+0x380/0x380 [ 2397.997124] ? selinux_file_permission+0x92/0x520 [ 2397.998152] ? do_splice_to+0x160/0x160 [ 2397.999003] ? security_file_permission+0x24e/0x570 [ 2398.000089] do_splice_direct+0x1c4/0x290 [ 2398.000942] ? splice_direct_to_actor+0x980/0x980 [ 2398.001929] ? selinux_file_permission+0x92/0x520 [ 2398.002920] ? security_file_permission+0x24e/0x570 [ 2398.003953] do_sendfile+0x553/0x1090 [ 2398.004737] ? do_pwritev+0x270/0x270 [ 2398.005522] ? wait_for_completion_io+0x270/0x270 [ 2398.006515] ? rcu_read_lock_any_held+0x75/0xa0 [ 2398.007511] ? vfs_write+0x354/0xa70 [ 2398.008333] __x64_sys_sendfile64+0x1d1/0x210 [ 2398.009248] ? __ia32_sys_sendfile+0x220/0x220 [ 2398.010195] do_syscall_64+0x33/0x40 [ 2398.010960] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2398.012018] RIP: 0033:0x7f65e458eb19 [ 2398.012777] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2398.016612] RSP: 002b:00007f65e1b04188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2398.018193] RAX: ffffffffffffffda RBX: 00007f65e46a1f60 RCX: 00007f65e458eb19 [ 2398.019711] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000006 [ 2398.021204] RBP: 00007f65e1b041d0 R08: 0000000000000000 R09: 0000000000000000 [ 2398.022709] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2398.024159] R13: 00007fff69f4ef1f R14: 00007f65e1b04300 R15: 0000000000022000 18:47:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) openat(r3, &(0x7f0000000200)='./file0\x00', 0x200080, 0x142) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r4, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x15, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:47:59 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000ff0f) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x1000439e5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:47:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x1000001da) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x16, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:47:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f00000002c0)='./file1/file0\x00') chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001980)='./file1/file0\x00', 0x351542, 0x2e) chdir(&(0x7f0000000280)='./file1\x00') syz_mount_image$nfs4(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x7, 0x3, &(0x7f0000001900)=[{&(0x7f0000000300)="bf8ce2455ed07d9e6a4492c52704d222e1b3fdd5cbcb133e14c17dd8049ffea0c23e5a46ae6a4f3344d6bb26c5202f7a60c68f3dee3827822bf592c9da9ce095f50b5137e13791732dd178492df7506499f9a870a9658ab74e7bcfb8b53e967eec05430125a9af695f2eeb180824b9ee06d9bf57b90126d1777bca5330402fa2b1d9ddde409c75e8840bdc35b9ba6cf5fc4ad4682a891c66f0a01320bfde4a1f4f18a194863c2560007f06e64b9422fab7fc6f45b826f93bef8c5d925dea882937f5cf0e284fcd26fae67e1a2bd1027292e9dc9413e70cfd036e0ed9ca72e4738ffac5b5f0bcfa8191c916424831e9a701e47d0fe4", 0xf5, 0x3ff}, {&(0x7f0000001800)="9b007782eb4d81ef29e2c320d37a73887b36f47f0772d83e7461fae472bb37d295444f3bb6857b445ade27ac02bfe1b5257054bdc77c709a61a99abdf30119baa2939222837baa5357e748aac13853db1d51817bf4f6ae590369a5f319f4e66a022f4f7d46f18a82cbd3b50b069b741f13c0f1e7048b6950d86cfc6e40919f5fe22edef028c5622dca54b785945aae3197aaccc3ee40fa9b807b52355dd47570faae8bef3766c71c1858999c6ef10944137e3c44bebd7d0e388d55ae37cda2dceda92e2d9dd94b", 0xc7, 0x1f8000000}, {&(0x7f0000000240), 0x0, 0x5}], 0x2000000, &(0x7f00000021c0)=ANY=[@ANYBLOB="2c24232940235e7b2c76666174002c2c2c6d6561737572652c686173682c730161636b66737472616e736d7574653d76666174002c736d61636b66736465663d282e2c2b3a5e907b3a2c7365636c6162656c2c6f626a5f726f6c653d2c27473a2c232c736d61636b6673666c6f6f723d2c724a6f74636f6e746578743d757365725f752c00912ec703e6f90e203ff0ac410b32ca5b6bd465091eb295f2fc4fd63d2f6937a19ac6b3ae3cec233cff34702f945a9f5d561921bc161a5241801bcaf9142b410fe3ba1683ed904af4accad119be3697cf82e4058bc85777b14a47711082"]) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r2 = syz_mount_image$nfs4(&(0x7f0000000240), &(0x7f0000001bc0)='./file0\x00', 0x8, 0x7, &(0x7f0000002080)=[{&(0x7f0000001c00)="3ff15ccbf483ee8557db717a46d2c8be16588b9e8f868367f5a124e5fbb5f8371f5e5a11fd7fd7cf6516b5f1aaf221a024287ae9e757ee6b77968818d6578d8ae2859a461a9b92965f311ad06f17db1849434fa6944d800f94a26786e0c70d539010e140297a3d7cb45161cbb632db0bd65f931bc8b075d078602fc955c618d4124e02a99e00999d50cbff5bb1d91b4011c7c2e79a067d979cc8c885c48d652c95a94eb5c65ce5d699913c8df2511ff3f0138efcdc1e99d2cd56187ce88c97f2c4c15fe31493c6", 0xc7}, {&(0x7f0000001e00)="35b9aec054626c6578e8d8695571f89f0c81a14b14e04708a915a9297af5b3a166bf66f5cef62411ef26e96397258971da04c8434360b4e7870bb0343e997406fcd3669ed48aa9e4abb3e784a5c631cb67236c48ef356b5375c4629022a0383113cdad9058089dedb73e96812e0d8b476112aa683cf8262c15abe985cf156d858f5b2cbf72437448396be1090072ced9fef3744522fd4c1d0286be911911a2e32db140ab1116438fb4cb153e0bb4d83797253ba0f8d2689fa0cf3330370750f95d094b5db0a1ccefa7a4bfe44b8bd937c574088d241a999b72d0", 0xda, 0x3f}, {&(0x7f0000001d00)="6340df16adfc4f2b674400", 0xb, 0x20}, {&(0x7f0000001f00)="f7a63e06151a147e7956b40bc65e7bffa3ff59a45f7000cc0d7a35e095e4d9f3b78152887a6ac203aac12c55211cf1beaac9fcdcd620e8a2eb5aa7b81e82b1d9716300e3872477babd55e63f3c03185f00153a006ab85bdb2c9b01853579177f1613c2b171349a117b19d61afb0e7cea894e443bee9ecfed03b19e997466ecb1d14c9709e85595e1f49b84424a2a3c7ca673f91216fe67d1af4dce4c888a66c763cd9046538347449798154bff", 0xad, 0x80}, {&(0x7f0000001fc0)="15c79a1b4d0f9bbd0f961a5f19e2ca30b6a7fad8bc4eb689e029560a1766bb480e5fde833f8ee5a4cb3d5e8507d5dab4baa3b5500eb85834b9671aaa067298829070215082b5eda36959542ab1a08c32fb32352f336c36b513f422c81f9e35df70da974e68020d70fd7b98404f24a4bb22dae84e8bfda2", 0x77}, {&(0x7f0000001d40)="50002e4f69d757d6a4d6e24da481628d1964123ac2df4bba461b5f", 0x1b}, {&(0x7f0000002040)="51b01aa7", 0x4, 0x7}], 0x2004c, &(0x7f0000002140)={[{}, {'+\'.{]!\''}, {'smackfsfloor'}], [{@subj_user={'subj_user', 0x3d, '])'}}, {@seclabel}, {@audit}, {@subj_type={'subj_type', 0x3d, '!%^\\'}}, {@uid_lt={'uid<', 0xee00}}, {@fowner_lt={'fowner<', 0xee01}}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001b80)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd_index, 0x1, {0x0, r0}, 0x5, 0x2, 0x0, {0x0, r1, r2}}, 0x5) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r3, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="969d000000002f51696c653000"]) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) r6 = accept$inet6(r4, &(0x7f0000001a40)={0xa, 0x0, 0x0, @local}, &(0x7f0000001a80)=0x1c) connect$inet6(r6, &(0x7f0000001ac0)={0xa, 0x4e22, 0x7fffffff, @private0, 0x80}, 0x1c) ioctl$BTRFS_IOC_DEV_INFO(r4, 0xd000941e, &(0x7f0000000800)={r5, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100040440) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:47:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 3) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) [ 2398.623849] FAULT_INJECTION: forcing a failure. [ 2398.623849] name failslab, interval 1, probability 0, space 0, times 0 [ 2398.626494] CPU: 1 PID: 14479 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2398.627889] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2398.629576] Call Trace: [ 2398.630129] dump_stack+0x107/0x167 [ 2398.630877] should_fail.cold+0x5/0xa [ 2398.631696] ? memcg_alloc_page_obj_cgroups+0x73/0x100 [ 2398.632784] should_failslab+0x5/0x20 [ 2398.633568] __kmalloc_node+0x76/0x420 [ 2398.634379] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 2398.635438] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 2398.636464] ? trace_hardirqs_on+0x5b/0x180 [ 2398.637371] kmem_cache_alloc_trace+0x169/0x320 [ 2398.638339] alloc_pipe_info+0x10a/0x590 [ 2398.639169] splice_direct_to_actor+0x774/0x980 [ 2398.640117] ? _cond_resched+0x12/0x80 [ 2398.640907] ? inode_security+0x107/0x140 [ 2398.641750] ? pipe_to_sendpage+0x380/0x380 [ 2398.642643] ? selinux_file_permission+0x92/0x520 [ 2398.643634] ? do_splice_to+0x160/0x160 [ 2398.644455] ? security_file_permission+0x24e/0x570 [ 2398.645471] do_splice_direct+0x1c4/0x290 [ 2398.646300] ? splice_direct_to_actor+0x980/0x980 [ 2398.647293] ? selinux_file_permission+0x92/0x520 [ 2398.648278] ? security_file_permission+0x24e/0x570 [ 2398.649304] do_sendfile+0x553/0x1090 [ 2398.650098] ? do_pwritev+0x270/0x270 [ 2398.650881] ? wait_for_completion_io+0x270/0x270 [ 2398.651884] ? rcu_read_lock_any_held+0x75/0xa0 [ 2398.652850] ? vfs_write+0x354/0xa70 [ 2398.653630] __x64_sys_sendfile64+0x1d1/0x210 [ 2398.654528] ? __ia32_sys_sendfile+0x220/0x220 [ 2398.655498] do_syscall_64+0x33/0x40 [ 2398.656255] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2398.657293] RIP: 0033:0x7f65e458eb19 18:47:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x17, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) [ 2398.658060] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2398.662079] RSP: 002b:00007f65e1b04188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2398.663667] RAX: ffffffffffffffda RBX: 00007f65e46a1f60 RCX: 00007f65e458eb19 [ 2398.665162] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2398.666610] RBP: 00007f65e1b041d0 R08: 0000000000000000 R09: 0000000000000000 [ 2398.668068] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2398.669524] R13: 00007fff69f4ef1f R14: 00007f65e1b04300 R15: 0000000000022000 18:47:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:48:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x140, 0x31) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:48:00 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x18, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:48:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100040441) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:48:15 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100014006) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:48:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000002) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:48:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) r2 = syz_open_dev$char_usb(0xc, 0xb4, 0x9) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {0x7}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r3, 0xd000941e, &(0x7f0000000800)={r4, "b76a24f24ac24227549f48ce1baee3b2"}) 18:48:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000505) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:48:15 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x19, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:48:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x1000439e6) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:48:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) [ 2413.918929] FAULT_INJECTION: forcing a failure. [ 2413.918929] name failslab, interval 1, probability 0, space 0, times 0 [ 2413.921594] CPU: 0 PID: 14531 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2413.923089] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2413.924800] Call Trace: [ 2413.925355] dump_stack+0x107/0x167 [ 2413.926115] should_fail.cold+0x5/0xa [ 2413.926903] ? create_object.isra.0+0x3a/0xa20 [ 2413.927860] should_failslab+0x5/0x20 [ 2413.928646] kmem_cache_alloc+0x5b/0x310 [ 2413.929497] create_object.isra.0+0x3a/0xa20 [ 2413.930399] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2413.931449] __kmalloc+0x16e/0x390 [ 2413.932192] alloc_pipe_info+0x1e5/0x590 [ 2413.933032] splice_direct_to_actor+0x774/0x980 [ 2413.933986] ? _cond_resched+0x12/0x80 [ 2413.934779] ? inode_security+0x107/0x140 [ 2413.935630] ? pipe_to_sendpage+0x380/0x380 [ 2413.936498] ? selinux_file_permission+0x92/0x520 [ 2413.937467] ? do_splice_to+0x160/0x160 [ 2413.938260] ? security_file_permission+0x24e/0x570 [ 2413.939266] do_splice_direct+0x1c4/0x290 [ 2413.940113] ? splice_direct_to_actor+0x980/0x980 [ 2413.941076] ? selinux_file_permission+0x92/0x520 [ 2413.942051] ? security_file_permission+0x24e/0x570 [ 2413.943057] do_sendfile+0x553/0x1090 [ 2413.943840] ? do_pwritev+0x270/0x270 [ 2413.944611] ? wait_for_completion_io+0x270/0x270 [ 2413.945575] ? rcu_read_lock_any_held+0x75/0xa0 [ 2413.946502] ? vfs_write+0x354/0xa70 [ 2413.947259] __x64_sys_sendfile64+0x1d1/0x210 [ 2413.948186] ? __ia32_sys_sendfile+0x220/0x220 [ 2413.949115] do_syscall_64+0x33/0x40 [ 2413.949878] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2413.950906] RIP: 0033:0x7f65e458eb19 [ 2413.951663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2413.955315] RSP: 002b:00007f65e1b04188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2413.956837] RAX: ffffffffffffffda RBX: 00007f65e46a1f60 RCX: 00007f65e458eb19 [ 2413.958265] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2413.959718] RBP: 00007f65e1b041d0 R08: 0000000000000000 R09: 0000000000000000 [ 2413.961136] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2413.962560] R13: 00007fff69f4ef1f R14: 00007f65e1b04300 R15: 0000000000022000 18:48:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100043a02) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:48:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000506) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:48:29 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x1a, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:48:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100040449) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:48:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) openat(0xffffffffffffffff, &(0x7f0000000200)='./file0/../file0\x00', 0x22400, 0x162) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file2\x00', 0x12000, 0x40) 18:48:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 5) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:48:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000003) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:48:29 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100014007) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:48:29 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x1b, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) [ 2427.886222] FAULT_INJECTION: forcing a failure. [ 2427.886222] name failslab, interval 1, probability 0, space 0, times 0 [ 2427.887605] CPU: 1 PID: 14570 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2427.888407] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2427.889369] Call Trace: [ 2427.889682] dump_stack+0x107/0x167 [ 2427.890126] should_fail.cold+0x5/0xa [ 2427.890583] ? iter_file_splice_write+0x16d/0xc30 [ 2427.891158] should_failslab+0x5/0x20 [ 2427.891637] __kmalloc+0x72/0x390 [ 2427.892053] iter_file_splice_write+0x16d/0xc30 [ 2427.892613] ? atime_needs_update+0x600/0x600 [ 2427.893142] ? generic_splice_sendpage+0x140/0x140 [ 2427.893718] ? pipe_to_user+0x170/0x170 [ 2427.894176] ? _cond_resched+0x12/0x80 [ 2427.894629] ? avc_policy_seqno+0x9/0x70 [ 2427.895047] ? selinux_file_permission+0x92/0x520 [ 2427.895603] ? lockdep_init_map_type+0x2c7/0x780 [ 2427.896134] ? generic_splice_sendpage+0x140/0x140 [ 2427.896686] direct_splice_actor+0x10f/0x170 [ 2427.897181] splice_direct_to_actor+0x387/0x980 [ 2427.897711] ? pipe_to_sendpage+0x380/0x380 [ 2427.898200] ? do_splice_to+0x160/0x160 [ 2427.898653] ? security_file_permission+0x24e/0x570 [ 2427.899217] do_splice_direct+0x1c4/0x290 [ 2427.899686] ? splice_direct_to_actor+0x980/0x980 [ 2427.900229] ? selinux_file_permission+0x92/0x520 [ 2427.900779] ? security_file_permission+0x24e/0x570 [ 2427.901347] do_sendfile+0x553/0x1090 [ 2427.901790] ? do_pwritev+0x270/0x270 [ 2427.902216] ? wait_for_completion_io+0x270/0x270 [ 2427.902757] ? rcu_read_lock_any_held+0x75/0xa0 [ 2427.903282] ? vfs_write+0x354/0xa70 [ 2427.903724] __x64_sys_sendfile64+0x1d1/0x210 [ 2427.904214] ? __ia32_sys_sendfile+0x220/0x220 [ 2427.904724] do_syscall_64+0x33/0x40 [ 2427.905136] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2427.905694] RIP: 0033:0x7f65e458eb19 [ 2427.906108] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2427.908217] RSP: 002b:00007f65e1b04188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2427.909085] RAX: ffffffffffffffda RBX: 00007f65e46a1f60 RCX: 00007f65e458eb19 [ 2427.909894] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2427.910628] RBP: 00007f65e1b041d0 R08: 0000000000000000 R09: 0000000000000000 [ 2427.911439] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2427.912189] R13: 00007fff69f4ef1f R14: 00007f65e1b04300 R15: 0000000000022000 18:48:29 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x1c, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:48:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 6) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:48:29 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x1d, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:48:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x1000fffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) [ 2428.244871] FAULT_INJECTION: forcing a failure. [ 2428.244871] name failslab, interval 1, probability 0, space 0, times 0 [ 2428.246939] CPU: 0 PID: 14606 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2428.248064] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2428.249374] Call Trace: [ 2428.249800] dump_stack+0x107/0x167 [ 2428.250378] should_fail.cold+0x5/0xa [ 2428.250982] ? create_object.isra.0+0x3a/0xa20 [ 2428.251720] should_failslab+0x5/0x20 [ 2428.252305] kmem_cache_alloc+0x5b/0x310 [ 2428.252942] create_object.isra.0+0x3a/0xa20 [ 2428.253620] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2428.254410] __kmalloc+0x16e/0x390 [ 2428.254993] alloc_pipe_info+0x1e5/0x590 [ 2428.255638] splice_direct_to_actor+0x774/0x980 [ 2428.256358] ? _cond_resched+0x12/0x80 [ 2428.256960] ? inode_security+0x107/0x140 [ 2428.257602] ? pipe_to_sendpage+0x380/0x380 [ 2428.258263] ? selinux_file_permission+0x92/0x520 [ 2428.259007] ? do_splice_to+0x160/0x160 [ 2428.259637] ? security_file_permission+0x24e/0x570 [ 2428.260419] do_splice_direct+0x1c4/0x290 [ 2428.261057] ? splice_direct_to_actor+0x980/0x980 [ 2428.261797] ? selinux_file_permission+0x92/0x520 [ 2428.262545] ? security_file_permission+0x24e/0x570 [ 2428.263310] do_sendfile+0x553/0x1090 [ 2428.263926] ? do_pwritev+0x270/0x270 [ 2428.264507] ? wait_for_completion_io+0x270/0x270 [ 2428.265251] ? rcu_read_lock_any_held+0x75/0xa0 [ 2428.265956] ? vfs_write+0x354/0xa70 [ 2428.266539] __x64_sys_sendfile64+0x1d1/0x210 [ 2428.267214] ? __ia32_sys_sendfile+0x220/0x220 [ 2428.267918] do_syscall_64+0x33/0x40 [ 2428.268492] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2428.269282] RIP: 0033:0x7f65e458eb19 [ 2428.269857] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2428.272649] RSP: 002b:00007f65e1b04188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2428.273812] RAX: ffffffffffffffda RBX: 00007f65e46a1f60 RCX: 00007f65e458eb19 [ 2428.274919] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2428.276017] RBP: 00007f65e1b041d0 R08: 0000000000000000 R09: 0000000000000000 [ 2428.277121] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2428.278212] R13: 00007fff69f4ef1f R14: 00007f65e1b04300 R15: 0000000000022000 18:48:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10004044a) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:48:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000004) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:48:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000507) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:48:29 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x1e, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:48:29 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100014008) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:48:29 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x21, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:48:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 7) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:48:29 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x22, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) [ 2428.735194] FAULT_INJECTION: forcing a failure. [ 2428.735194] name failslab, interval 1, probability 0, space 0, times 0 [ 2428.737134] CPU: 0 PID: 14642 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2428.738209] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2428.739491] Call Trace: [ 2428.739941] dump_stack+0x107/0x167 [ 2428.740530] should_fail.cold+0x5/0xa [ 2428.741144] ? iter_file_splice_write+0x16d/0xc30 [ 2428.741915] should_failslab+0x5/0x20 [ 2428.742525] __kmalloc+0x72/0x390 [ 2428.743088] iter_file_splice_write+0x16d/0xc30 [ 2428.743834] ? atime_needs_update+0x600/0x600 [ 2428.744558] ? generic_splice_sendpage+0x140/0x140 [ 2428.745327] ? pipe_to_user+0x170/0x170 [ 2428.745964] ? _cond_resched+0x12/0x80 [ 2428.746564] ? avc_policy_seqno+0x9/0x70 [ 2428.747188] ? selinux_file_permission+0x92/0x520 [ 2428.747941] ? lockdep_init_map_type+0x2c7/0x780 [ 2428.748659] ? generic_splice_sendpage+0x140/0x140 [ 2428.749407] direct_splice_actor+0x10f/0x170 [ 2428.750074] splice_direct_to_actor+0x387/0x980 [ 2428.750785] ? pipe_to_sendpage+0x380/0x380 [ 2428.751436] ? do_splice_to+0x160/0x160 [ 2428.752049] ? security_file_permission+0x24e/0x570 [ 2428.752807] do_splice_direct+0x1c4/0x290 [ 2428.753435] ? splice_direct_to_actor+0x980/0x980 [ 2428.754152] ? selinux_file_permission+0x92/0x520 18:48:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10fffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) [ 2428.754875] ? security_file_permission+0x24e/0x570 [ 2428.755751] do_sendfile+0x553/0x1090 [ 2428.756340] ? do_pwritev+0x270/0x270 [ 2428.756918] ? wait_for_completion_io+0x270/0x270 [ 2428.757644] ? rcu_read_lock_any_held+0x75/0xa0 [ 2428.758351] ? vfs_write+0x354/0xa70 [ 2428.758916] __x64_sys_sendfile64+0x1d1/0x210 [ 2428.759598] ? __ia32_sys_sendfile+0x220/0x220 [ 2428.760295] do_syscall_64+0x33/0x40 [ 2428.760859] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2428.761627] RIP: 0033:0x7f65e458eb19 [ 2428.762209] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2428.764997] RSP: 002b:00007f65e1b04188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2428.766140] RAX: ffffffffffffffda RBX: 00007f65e46a1f60 RCX: 00007f65e458eb19 [ 2428.767223] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2428.768303] RBP: 00007f65e1b041d0 R08: 0000000000000000 R09: 0000000000000000 [ 2428.769378] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2428.770442] R13: 00007fff69f4ef1f R14: 00007f65e1b04300 R15: 0000000000022000 18:48:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="0200"/12, @ANYRES32, @ANYBLOB="969d0000000000002e2f66696c653000"]) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:48:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 8) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:48:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000005) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:48:45 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100014009) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:48:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000508) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:48:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100040452) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:48:45 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x23, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:48:45 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000061440)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x4f, "3d6af026ab520b"}) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) fspick(r0, &(0x7f00000001c0)='./file0\x00', 0x1) sendfile(r1, r2, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000001800)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="969d0000000000002e5c2693fc2f666966c51950ae5220f6b4216d3e81b01e9433a0d9481e17b5c35176eab84192f8d6c22b1d194c7849d7c0e54b2fa9ecc60a5cbfe29b855392e2ddceb68b494a62d00976c0492de8a403dbc03db5764bab87b97a8ac4770e0d6aa8cf53f52380e003ecceae01000000000000002e08a46865b90f0c70e7952aa74cbcb46593971bfdd649303cd631132ffa8691d3e644eb12d0bee74c2759c94bd046d3e85a4fc313e2dc5ff0138dab34d00e527277b14b8f894e788a469c7530aa84936265da3be8266cbf74f27002f004cfb28ed02ef140c2c3cf09080df28cd4e08a5565267240447a"]) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r4, 0xd000941e, &(0x7f0000000800)={r5, "b76a24f24ac24227549f48ce1baee3b2"}) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r6, 0x8915, 0x0) pread64(r6, &(0x7f0000000100)=""/31, 0x1f, 0x3) [ 2444.341202] FAULT_INJECTION: forcing a failure. [ 2444.341202] name failslab, interval 1, probability 0, space 0, times 0 [ 2444.343864] CPU: 0 PID: 14662 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2444.345270] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2444.346957] Call Trace: [ 2444.347503] dump_stack+0x107/0x167 [ 2444.348286] should_fail.cold+0x5/0xa [ 2444.349064] ? create_object.isra.0+0x3a/0xa20 [ 2444.349995] should_failslab+0x5/0x20 [ 2444.350764] kmem_cache_alloc+0x5b/0x310 [ 2444.351588] create_object.isra.0+0x3a/0xa20 [ 2444.352484] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2444.353508] kmem_cache_alloc+0x159/0x310 [ 2444.354346] alloc_buffer_head+0x20/0x110 [ 2444.355176] alloc_page_buffers+0x14d/0x700 [ 2444.356056] create_empty_buffers+0x2c/0x640 [ 2444.356942] create_page_buffers+0x1bb/0x230 [ 2444.357821] __block_write_begin_int+0x1d1/0x19c0 [ 2444.358779] ? fat_add_cluster+0x100/0x100 [ 2444.359636] ? add_to_page_cache_locked+0x40/0x40 [ 2444.360616] ? __page_cache_alloc+0x10d/0x360 [ 2444.361510] ? remove_inode_buffers+0x300/0x300 [ 2444.362427] ? pagecache_get_page+0x243/0xc80 [ 2444.363318] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2444.364367] ? wait_for_stable_page+0x92/0xe0 [ 2444.365260] cont_write_begin+0x472/0x980 [ 2444.366087] ? fat_add_cluster+0x100/0x100 [ 2444.366920] ? nobh_write_begin+0xed0/0xed0 [ 2444.367778] ? __mark_inode_dirty+0x93b/0xd40 [ 2444.368685] ? lock_downgrade+0x6d0/0x6d0 [ 2444.369520] ? do_raw_spin_lock+0x121/0x260 [ 2444.370375] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2444.371399] ? rwlock_bug.part.0+0x90/0x90 [ 2444.372248] fat_write_begin+0x89/0x180 [ 2444.373063] ? fat_add_cluster+0x100/0x100 [ 2444.373903] generic_perform_write+0x20a/0x4f0 [ 2444.374821] ? fat_direct_IO+0x1ef/0x380 [ 2444.375624] ? page_cache_next_miss+0x310/0x310 [ 2444.376582] __generic_file_write_iter+0x2cd/0x5d0 [ 2444.377558] generic_file_write_iter+0xdb/0x230 [ 2444.378484] do_iter_readv_writev+0x476/0x750 [ 2444.379374] ? new_sync_write+0x660/0x660 [ 2444.380203] ? selinux_file_permission+0x92/0x520 [ 2444.381174] do_iter_write+0x191/0x670 [ 2444.381944] ? trace_hardirqs_on+0x5b/0x180 [ 2444.382818] vfs_iter_write+0x70/0xa0 [ 2444.383579] iter_file_splice_write+0x762/0xc30 [ 2444.384539] ? generic_splice_sendpage+0x140/0x140 [ 2444.385516] ? avc_policy_seqno+0x9/0x70 [ 2444.386330] ? selinux_file_permission+0x92/0x520 [ 2444.387286] ? lockdep_init_map_type+0x2c7/0x780 [ 2444.388263] ? generic_splice_sendpage+0x140/0x140 [ 2444.389233] direct_splice_actor+0x10f/0x170 [ 2444.390116] splice_direct_to_actor+0x387/0x980 [ 2444.391039] ? pipe_to_sendpage+0x380/0x380 [ 2444.391905] ? do_splice_to+0x160/0x160 [ 2444.392697] ? security_file_permission+0x24e/0x570 [ 2444.393690] do_splice_direct+0x1c4/0x290 [ 2444.394519] ? splice_direct_to_actor+0x980/0x980 [ 2444.395469] ? selinux_file_permission+0x92/0x520 [ 2444.396460] ? security_file_permission+0x24e/0x570 [ 2444.397447] do_sendfile+0x553/0x1090 [ 2444.398216] ? do_pwritev+0x270/0x270 [ 2444.398972] ? wait_for_completion_io+0x270/0x270 [ 2444.399945] ? rcu_read_lock_any_held+0x75/0xa0 [ 2444.400854] ? vfs_write+0x354/0xa70 [ 2444.401591] __x64_sys_sendfile64+0x1d1/0x210 [ 2444.402486] ? __ia32_sys_sendfile+0x220/0x220 [ 2444.403396] do_syscall_64+0x33/0x40 [ 2444.404168] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2444.405170] RIP: 0033:0x7f65e458eb19 [ 2444.405915] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2444.409507] RSP: 002b:00007f65e1b04188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2444.411000] RAX: ffffffffffffffda RBX: 00007f65e46a1f60 RCX: 00007f65e458eb19 [ 2444.412401] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2444.413796] RBP: 00007f65e1b041d0 R08: 0000000000000000 R09: 0000000000000000 [ 2444.415181] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2444.416590] R13: 00007fff69f4ef1f R14: 00007f65e1b04300 R15: 0000000000022000 18:48:45 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x24, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:49:00 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x25, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:49:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100040453) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) lsetxattr$security_selinux(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340), &(0x7f0000000380)='system_u:object_r:logrotate_exec_t:s0\x00', 0x26, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="969d502f66ff026530002e014f5b366eccc71ef93a4662fec66f37fe305db8d1452b1f12d9bf8599fb26a398e13b37f72f429c6ff475688d54edeea1e5964446ac7d0b8ff84c29fcd8def8582bfadb00a1d1f83e9c8e0c9ad8ea6e4e545667eb2e0371663d5669ffaaea22060080aa7e2e544ccb5bdaa5ec7f0bada2"]) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fallocate(r2, 0x20, 0xfffffffffffffffc, 0x7) syz_open_dev$mouse(&(0x7f0000000100), 0x8001, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:49:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, 0x0) getsockname(r1, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000240)=0x80) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r2, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file1\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r3, 0xd000941e, &(0x7f0000000800)={r4, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:00 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10001400a) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000509) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 9) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000006) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) [ 2459.502905] FAULT_INJECTION: forcing a failure. [ 2459.502905] name failslab, interval 1, probability 0, space 0, times 0 [ 2459.505330] CPU: 0 PID: 14725 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2459.506739] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2459.508439] Call Trace: [ 2459.508994] dump_stack+0x107/0x167 [ 2459.509750] should_fail.cold+0x5/0xa [ 2459.510542] ? create_object.isra.0+0x3a/0xa20 [ 2459.511482] should_failslab+0x5/0x20 [ 2459.512292] kmem_cache_alloc+0x5b/0x310 [ 2459.513130] create_object.isra.0+0x3a/0xa20 [ 2459.514034] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2459.515081] kmem_cache_alloc+0x159/0x310 [ 2459.515932] alloc_buffer_head+0x20/0x110 [ 2459.516777] alloc_page_buffers+0x14d/0x700 [ 2459.517669] create_empty_buffers+0x2c/0x640 [ 2459.518575] create_page_buffers+0x1bb/0x230 [ 2459.519476] __block_write_begin_int+0x1d1/0x19c0 [ 2459.520460] ? fat_add_cluster+0x100/0x100 [ 2459.521375] ? add_to_page_cache_locked+0x40/0x40 [ 2459.522360] ? __page_cache_alloc+0x10d/0x360 [ 2459.523264] ? remove_inode_buffers+0x300/0x300 [ 2459.524241] ? pagecache_get_page+0x243/0xc80 [ 2459.525158] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2459.526223] ? wait_for_stable_page+0x92/0xe0 [ 2459.527136] cont_write_begin+0x472/0x980 [ 2459.527998] ? fat_add_cluster+0x100/0x100 [ 2459.528860] ? nobh_write_begin+0xed0/0xed0 [ 2459.529718] ? __mark_inode_dirty+0x93b/0xd40 [ 2459.530605] ? lock_downgrade+0x6d0/0x6d0 [ 2459.531450] ? do_raw_spin_lock+0x121/0x260 [ 2459.532336] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2459.533346] ? rwlock_bug.part.0+0x90/0x90 [ 2459.534212] fat_write_begin+0x89/0x180 [ 2459.535021] ? fat_add_cluster+0x100/0x100 [ 2459.535883] generic_perform_write+0x20a/0x4f0 [ 2459.536828] ? fat_direct_IO+0x1ef/0x380 [ 2459.537640] ? page_cache_next_miss+0x310/0x310 [ 2459.538585] __generic_file_write_iter+0x2cd/0x5d0 [ 2459.539595] generic_file_write_iter+0xdb/0x230 [ 2459.540592] do_iter_readv_writev+0x476/0x750 [ 2459.541536] ? new_sync_write+0x660/0x660 [ 2459.542373] ? selinux_file_permission+0x92/0x520 [ 2459.543346] do_iter_write+0x191/0x670 [ 2459.544145] ? trace_hardirqs_on+0x5b/0x180 [ 2459.545026] vfs_iter_write+0x70/0xa0 [ 2459.545813] iter_file_splice_write+0x762/0xc30 [ 2459.546800] ? generic_splice_sendpage+0x140/0x140 [ 2459.547777] ? avc_policy_seqno+0x9/0x70 [ 2459.548617] ? selinux_file_permission+0x92/0x520 [ 2459.549605] ? lockdep_init_map_type+0x2c7/0x780 [ 2459.550572] ? generic_splice_sendpage+0x140/0x140 [ 2459.551569] direct_splice_actor+0x10f/0x170 [ 2459.552460] splice_direct_to_actor+0x387/0x980 [ 2459.553411] ? pipe_to_sendpage+0x380/0x380 [ 2459.554287] ? do_splice_to+0x160/0x160 [ 2459.555098] ? security_file_permission+0x24e/0x570 [ 2459.556125] do_splice_direct+0x1c4/0x290 [ 2459.556967] ? splice_direct_to_actor+0x980/0x980 [ 2459.557934] ? selinux_file_permission+0x92/0x520 [ 2459.558949] ? security_file_permission+0x24e/0x570 [ 2459.559980] do_sendfile+0x553/0x1090 [ 2459.560772] ? do_pwritev+0x270/0x270 [ 2459.561555] ? wait_for_completion_io+0x270/0x270 [ 2459.562530] ? rcu_read_lock_any_held+0x75/0xa0 [ 2459.563490] ? vfs_write+0x354/0xa70 [ 2459.564253] __x64_sys_sendfile64+0x1d1/0x210 [ 2459.565190] ? __ia32_sys_sendfile+0x220/0x220 [ 2459.566156] do_syscall_64+0x33/0x40 [ 2459.566919] entry_SYSCALL_64_after_hwframe+0x62/0xc7 18:49:00 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f00000001c0)='./file0\x00', r0, &(0x7f0000000200)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x20, 0x0, 0x3, 0x6, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') openat(r0, &(0x7f0000000240)='./file1\x00', 0x6c80, 0xa) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r1, r2, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r3, 0xd000941e, &(0x7f0000000800)={r4, "b76a24f24ac24227549f48ce1baee3b2"}) [ 2459.567963] RIP: 0033:0x7f65e458eb19 [ 2459.568904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2459.572663] RSP: 002b:00007f65e1b04188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2459.574224] RAX: ffffffffffffffda RBX: 00007f65e46a1f60 RCX: 00007f65e458eb19 [ 2459.575682] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2459.577132] RBP: 00007f65e1b041d0 R08: 0000000000000000 R09: 0000000000000000 [ 2459.578559] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2459.580021] R13: 00007fff69f4ef1f R14: 00007f65e1b04300 R15: 0000000000022000 18:49:00 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x26, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:49:01 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x27, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:49:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bind(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x100820, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000001800)={0x0, 0x0, 0x2, 0x0, '\x00', [{0x8, 0x1, 0xe528, 0x3, 0x6, 0x4000000000}, {0x8000, 0xff, 0xffffffffffff5cb6, 0x3, 0x63}], ['\x00', '\x00']}) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r3, 0xd000941e, &(0x7f0000000800)={r4, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:01 executing program 5: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, 0x0) r1 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000380)='devices.allow\x00', 0x2, 0x0) ioctl$INCFS_IOC_PERMIT_FILL(r0, 0x40046721, &(0x7f00000003c0)={r1}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000300)={{0x1, 0x1, 0x18, r2, {0x5d}}, './file1\x00'}) symlinkat(&(0x7f0000000240)='./file0\x00', r4, &(0x7f0000000340)='./file0\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) fallocate(r5, 0x20, 0x1, 0xffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x3, 0x2, 0x2, 0xea, 0x0, 0x800, 0x4024, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0x5, 0x3}, 0x10000, 0x5, 0x5, 0x2, 0x8e, 0x7ff, 0x5, 0x0, 0xffffffff, 0x0, 0x1}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xb) sendfile(r3, r5, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:49:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:01 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x28, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:49:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10004045d) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:01 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x1000400b2) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000007) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) [ 2460.272994] FAULT_INJECTION: forcing a failure. [ 2460.272994] name failslab, interval 1, probability 0, space 0, times 0 [ 2460.275225] CPU: 0 PID: 14768 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2460.276383] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2460.277723] Call Trace: [ 2460.278165] dump_stack+0x107/0x167 [ 2460.278761] should_fail.cold+0x5/0xa [ 2460.279422] ? create_object.isra.0+0x3a/0xa20 [ 2460.280167] should_failslab+0x5/0x20 [ 2460.280799] kmem_cache_alloc+0x5b/0x310 [ 2460.281472] create_object.isra.0+0x3a/0xa20 [ 2460.282273] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2460.283100] kmem_cache_alloc+0x159/0x310 [ 2460.283819] alloc_buffer_head+0x20/0x110 [ 2460.284574] alloc_page_buffers+0x14d/0x700 [ 2460.285262] create_empty_buffers+0x2c/0x640 [ 2460.286023] create_page_buffers+0x1bb/0x230 [ 2460.286749] __block_write_begin_int+0x1d1/0x19c0 [ 2460.287597] ? fat_add_cluster+0x100/0x100 [ 2460.288342] ? add_to_page_cache_locked+0x40/0x40 [ 2460.289134] ? __page_cache_alloc+0x10d/0x360 [ 2460.289852] ? remove_inode_buffers+0x300/0x300 [ 2460.290626] ? pagecache_get_page+0x243/0xc80 [ 2460.291360] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2460.292304] ? wait_for_stable_page+0x92/0xe0 [ 2460.293036] cont_write_begin+0x472/0x980 [ 2460.293716] ? fat_add_cluster+0x100/0x100 [ 2460.294392] ? nobh_write_begin+0xed0/0xed0 [ 2460.295087] ? __mark_inode_dirty+0x93b/0xd40 [ 2460.295803] ? lock_downgrade+0x6d0/0x6d0 [ 2460.296515] ? do_raw_spin_lock+0x121/0x260 [ 2460.297210] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2460.298049] ? rwlock_bug.part.0+0x90/0x90 [ 2460.298786] fat_write_begin+0x89/0x180 [ 2460.299419] ? fat_add_cluster+0x100/0x100 [ 2460.300108] generic_perform_write+0x20a/0x4f0 [ 2460.300855] ? fat_direct_IO+0x1ef/0x380 [ 2460.301506] ? page_cache_next_miss+0x310/0x310 [ 2460.302271] __generic_file_write_iter+0x2cd/0x5d0 18:49:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100000600) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) [ 2460.303062] generic_file_write_iter+0xdb/0x230 [ 2460.304014] do_iter_readv_writev+0x476/0x750 [ 2460.304741] ? new_sync_write+0x660/0x660 [ 2460.305412] ? selinux_file_permission+0x92/0x520 [ 2460.306198] do_iter_write+0x191/0x670 [ 2460.306828] ? trace_hardirqs_on+0x5b/0x180 [ 2460.307517] vfs_iter_write+0x70/0xa0 [ 2460.308132] iter_file_splice_write+0x762/0xc30 [ 2460.308928] ? generic_splice_sendpage+0x140/0x140 [ 2460.309794] ? avc_policy_seqno+0x9/0x70 [ 2460.310439] ? selinux_file_permission+0x92/0x520 [ 2460.311223] ? lockdep_init_map_type+0x2c7/0x780 [ 2460.311979] ? generic_splice_sendpage+0x140/0x140 [ 2460.312779] direct_splice_actor+0x10f/0x170 [ 2460.313466] splice_direct_to_actor+0x387/0x980 [ 2460.314228] ? pipe_to_sendpage+0x380/0x380 [ 2460.314923] ? do_splice_to+0x160/0x160 [ 2460.315571] ? security_file_permission+0x24e/0x570 [ 2460.316395] do_splice_direct+0x1c4/0x290 [ 2460.317053] ? splice_direct_to_actor+0x980/0x980 [ 2460.317857] ? selinux_file_permission+0x92/0x520 [ 2460.318635] ? security_file_permission+0x24e/0x570 [ 2460.319438] do_sendfile+0x553/0x1090 [ 2460.320055] ? do_pwritev+0x270/0x270 [ 2460.320649] ? wait_for_completion_io+0x270/0x270 [ 2460.321440] ? rcu_read_lock_any_held+0x75/0xa0 [ 2460.322187] ? vfs_write+0x354/0xa70 [ 2460.322797] __x64_sys_sendfile64+0x1d1/0x210 [ 2460.323514] ? __ia32_sys_sendfile+0x220/0x220 [ 2460.324267] do_syscall_64+0x33/0x40 [ 2460.324862] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2460.325694] RIP: 0033:0x7f65e458eb19 [ 2460.326314] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2460.329255] RSP: 002b:00007f65e1b04188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2460.330471] RAX: ffffffffffffffda RBX: 00007f65e46a1f60 RCX: 00007f65e458eb19 [ 2460.331626] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2460.332788] RBP: 00007f65e1b041d0 R08: 0000000000000000 R09: 0000000000000000 [ 2460.333901] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 2460.335024] R13: 00007fff69f4ef1f R14: 00007f65e1b04300 R15: 0000000000022000 18:49:17 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100002ff0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:17 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 11) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:17 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x1000400bb) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r1, r2, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x9d96}}, './file0\x00'}) r3 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/mnt\x00') fsetxattr$security_selinux(r3, &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:syslog_conf_t:s0\x00', 0x23, 0x0) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) mmap(&(0x7f0000ff6000/0x8000)=nil, 0x8000, 0x2000005, 0x10010, r3, 0xf7bdf000) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000800)={r4, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10004045e) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:17 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000008) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:49:17 executing program 5: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRESHEX, @ANYRESDEC, @ANYBLOB="1abe699d36e80588c323be66f013891be7a1566ede75525b959d3a9c11b4fc90719130ab3682fe06c3c828d507e539d95f44", @ANYRES64=r0]) chdir(&(0x7f0000000040)='./file0\x00') r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r4 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x40, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) r5 = open(&(0x7f0000000240)='./file1\x00', 0x0, 0x80) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r5, 0xc018937d, &(0x7f0000000300)={{0x1, 0x1, 0x18, r2, {0x3f}}, './file0\x00'}) sendfile(r3, r4, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:49:17 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x29, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) [ 2476.328334] FAT-fs (loop5): Unrecognized mount option "ÿÿÿÿ0xffffffffffffffff18446744073709551615¾i6èˆÃ#¾fð‰ç¡VnÞuR[•:œ´üq‘0«6‚þÃÈ(Õå9Ù_D" or missing value [ 2476.398237] FAULT_INJECTION: forcing a failure. [ 2476.398237] name failslab, interval 1, probability 0, space 0, times 0 [ 2476.401017] CPU: 0 PID: 14821 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2476.402460] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2476.404175] Call Trace: [ 2476.404753] dump_stack+0x107/0x167 [ 2476.405516] should_fail.cold+0x5/0xa [ 2476.406311] ? create_object.isra.0+0x3a/0xa20 [ 2476.407262] should_failslab+0x5/0x20 [ 2476.408055] kmem_cache_alloc+0x5b/0x310 [ 2476.408917] create_object.isra.0+0x3a/0xa20 [ 2476.409831] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2476.410884] kmem_cache_alloc+0x159/0x310 [ 2476.411736] alloc_buffer_head+0x20/0x110 [ 2476.412590] alloc_page_buffers+0x14d/0x700 [ 2476.413479] create_empty_buffers+0x2c/0x640 [ 2476.414388] create_page_buffers+0x1bb/0x230 [ 2476.415308] __block_write_begin_int+0x1d1/0x19c0 [ 2476.416338] ? fat_add_cluster+0x100/0x100 [ 2476.417205] ? add_to_page_cache_locked+0x40/0x40 [ 2476.418204] ? __page_cache_alloc+0x10d/0x360 [ 2476.419130] ? remove_inode_buffers+0x300/0x300 [ 2476.420092] ? pagecache_get_page+0x243/0xc80 [ 2476.421035] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2476.422115] ? wait_for_stable_page+0x92/0xe0 [ 2476.423045] cont_write_begin+0x472/0x980 [ 2476.423911] ? fat_add_cluster+0x100/0x100 [ 2476.424797] ? nobh_write_begin+0xed0/0xed0 [ 2476.425688] ? __mark_inode_dirty+0x93b/0xd40 [ 2476.426613] ? lock_downgrade+0x6d0/0x6d0 [ 2476.427461] ? do_raw_spin_lock+0x121/0x260 [ 2476.428370] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2476.429421] ? rwlock_bug.part.0+0x90/0x90 [ 2476.430293] fat_write_begin+0x89/0x180 [ 2476.431117] ? fat_add_cluster+0x100/0x100 [ 2476.431984] generic_perform_write+0x20a/0x4f0 [ 2476.432937] ? fat_direct_IO+0x1ef/0x380 [ 2476.433769] ? page_cache_next_miss+0x310/0x310 [ 2476.434737] __generic_file_write_iter+0x2cd/0x5d0 [ 2476.435747] generic_file_write_iter+0xdb/0x230 [ 2476.436712] do_iter_readv_writev+0x476/0x750 [ 2476.437635] ? new_sync_write+0x660/0x660 [ 2476.438487] ? selinux_file_permission+0x92/0x520 [ 2476.439493] do_iter_write+0x191/0x670 [ 2476.440332] ? trace_hardirqs_on+0x5b/0x180 [ 2476.441228] vfs_iter_write+0x70/0xa0 [ 2476.442028] iter_file_splice_write+0x762/0xc30 [ 2476.443010] ? generic_splice_sendpage+0x140/0x140 [ 2476.444027] ? avc_policy_seqno+0x9/0x70 [ 2476.444886] ? selinux_file_permission+0x92/0x520 [ 2476.445876] ? lockdep_init_map_type+0x2c7/0x780 [ 2476.446861] ? generic_splice_sendpage+0x140/0x140 [ 2476.447875] direct_splice_actor+0x10f/0x170 [ 2476.448812] splice_direct_to_actor+0x387/0x980 [ 2476.449786] ? pipe_to_sendpage+0x380/0x380 [ 2476.450687] ? do_splice_to+0x160/0x160 [ 2476.451503] ? security_file_permission+0x24e/0x570 [ 2476.452568] do_splice_direct+0x1c4/0x290 [ 2476.453430] ? splice_direct_to_actor+0x980/0x980 [ 2476.454422] ? selinux_file_permission+0x92/0x520 [ 2476.455428] ? security_file_permission+0x24e/0x570 [ 2476.456478] do_sendfile+0x553/0x1090 [ 2476.457297] ? do_pwritev+0x270/0x270 [ 2476.458105] ? wait_for_completion_io+0x270/0x270 [ 2476.459108] ? rcu_read_lock_any_held+0x75/0xa0 [ 2476.460077] ? vfs_write+0x354/0xa70 [ 2476.460892] __x64_sys_sendfile64+0x1d1/0x210 [ 2476.461818] ? __ia32_sys_sendfile+0x220/0x220 [ 2476.462768] do_syscall_64+0x33/0x40 [ 2476.463551] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2476.464626] RIP: 0033:0x7f65e458eb19 [ 2476.465396] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2476.469159] RSP: 002b:00007f65e1b04188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2476.470723] RAX: ffffffffffffffda RBX: 00007f65e46a1f60 RCX: 00007f65e458eb19 [ 2476.472183] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 2476.473667] RBP: 00007f65e1b041d0 R08: 0000000000000000 R09: 0000000000000000 [ 2476.475125] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 2476.476596] R13: 00007fff69f4ef1f R14: 00007f65e1b04300 R15: 0000000000022000 18:49:17 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x2a, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:49:17 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000009) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:49:17 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x2b, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) [ 2476.788734] FAT-fs (loop5): Unrecognized mount option "ÿÿÿÿ0xffffffffffffffff18446744073709551615¾i6èˆÃ#¾fð‰ç¡VnÞuR[•:œ´üq‘0«6‚þÃÈ(Õå9Ù_D" or missing value 18:49:18 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r3, 0x8915, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000200), &(0x7f0000000240)=@v2={0x2000000, [{0x1ff, 0x100}, {0x1, 0x6}]}, 0x14, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0x20000, 0x88) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r1, r2, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r4, 0xd000941e, &(0x7f0000000800)={r5, "b76a24f24ac24227549f48ce1baee3b2"}) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendfile(r0, r6, &(0x7f00000001c0)=0x2, 0x80000001) 18:49:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(r0, &(0x7f0000000300)='./file1\x00', 0x5ab100, 0x56) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000200), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0xd44}}, './file1/file0\x00'}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) accept$unix(r0, 0x0, &(0x7f00000001c0)) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r2, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:49:18 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x2c, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:49:18 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x1000400bc) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:18 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100002ffc) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100040466) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:18 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x10000000a) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:49:18 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x2d, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:49:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x10000000b) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:49:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x61, 0x4000000000000000, 0xa3ec) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100040467) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:31 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x1000400c5) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:31 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) openat(r1, &(0x7f00000001c0)='./file0\x00', 0x82000, 0x2) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r2, r3, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:49:31 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x2e, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:49:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000002) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100002ffd) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:31 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x2f, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:49:31 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x30, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:49:31 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, @in_args={0x2}}, './file1\x00'}) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r1, r2, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x5}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000240), &(0x7f0000000300)=0x4) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r5, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r5, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x5}) openat(r5, &(0x7f0000000200)='./file0\x00', 0x248080, 0x88) ioctl$BTRFS_IOC_DEV_INFO(r3, 0xd000941e, &(0x7f0000000800)={r4, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:31 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x31, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:49:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000003) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:32 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x1000400c6) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x10000000c) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:49:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x10000000d) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:49:45 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x1000400cf) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10004046e) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="969d00006c603000"]) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:49:45 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x32, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:49:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000004, 0x100010, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3a1c, &(0x7f0000000200)={0x0, 0xd12c, 0x7, 0x2, 0x55}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000001840)=0x0) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000340)=@IORING_OP_POLL_REMOVE={0x7, 0x3, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x0, {0x0, r2}}, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x102) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r3, r4, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="ca63eddb0e9701000000f7ffffff17000000", @ANYRES32=r3, @ANYBLOB="969d0000000000002e2f66696c653000"]) ioctl$BTRFS_IOC_SCRUB(r3, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r5, 0xd000941e, &(0x7f0000000800)={r6, "b76a24f24ac24227549f48ce1baee3b2"}) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000001800)=@IORING_OP_CONNECT={0x10, 0x5, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000380)=@nfc_llcp={0x27, 0x0, 0x0, 0x2, 0x4f, 0x6, "1639043990b9a9cda539d2f89586e4e9e7738d4ba4bab72ddbf77bbd9fe7c697852f0755a02b4140567c78b70e6efb11f3bbdfb774f25a9da02527c7d31c53", 0xa}, 0x0, 0x0, 0x1, {0x0, r7}}, 0x7) 18:49:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000004) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100002fff) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:45 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x33, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:49:45 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x1000fffff) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x34, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:49:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000005) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:59 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10fffffff) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x1000fffff) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) lseek(r2, 0x0, 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x200f5ef, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f00000001c0)='vfat\x00', &(0x7f0000000200)='./file1\x00', r3) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:49:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x10000000f) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:49:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100003004) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) recvmsg$unix(r1, &(0x7f0000001980)={&(0x7f00000001c0), 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/46, 0x2e}, {&(0x7f0000000300)=""/139, 0x8b}], 0x2, &(0x7f0000001800)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x148}, 0x40000000) syz_mount_image$tmpfs(&(0x7f00000019c0), &(0x7f0000001a00)='./file0\x00', 0x4, 0x2, &(0x7f0000001bc0)=[{&(0x7f0000001a40)="a06342ed2aee2ef44b011eb41f5ca180601e3725e2abf16be7853f9c8521967cc1ddf590f4b5f6353fd9e0db93f8af3743f5ff4a5f94d8049771f504b5cadd7dbc339095f9b01e05060817b318e76c80df3d1f3d15c03198ea7d20c228802bbcf7a75cc54152abbf6ee799848bb9c8aed321803959b3639b5bb070d2085ae9", 0x7f, 0x9}, {&(0x7f0000001ac0)="7e2716bab71dc5e706119d85ed6357f7d051f2e11eb98cae51141224d129ea87a056299ece7c6956da1b12ff99b0154d1e6cef07c2109c2112c9c8d7190a46573f5436967e390c4b73a4b0cc65b47257833e9656fed2924faf65598f1f99819efd4ddf87755145b2cf69a6d526c5721f58e5d1e476366367bd29140c9829146d0b8da4125099298f3336b893baad377b736b1e8b798999ea36aeb82477577f0d51ff9ae7fcfa8bc48d1da313d7d77a8cc87421acb435bcb3953f433d07f852519628e445429998c1ab41f582ad13beb1722944a1a1b82e63d28ed00d3cc1aceb988d534c931a529b5f7324", 0xeb, 0x9f}], 0x4000, &(0x7f0000001c00)={[{@uid={'uid', 0x3d, r3}}, {@size={'size', 0x3d, [0x2d, 0x30, 0x65, 0x38, 0x31, 0x74]}}]}) r4 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r4, 0x8915, 0x0) tee(r4, r2, 0xcc9, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) r7 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000001c40), 0x1, 0x0) fsetxattr$security_selinux(r7, &(0x7f0000001c80), &(0x7f0000001cc0)='system_u:object_r:device_t:s0\x00', 0x1e, 0x1) ioctl$BTRFS_IOC_DEV_INFO(r5, 0xd000941e, &(0x7f0000000800)={r6, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x35, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:49:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x36, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:49:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x37, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:49:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000100000018000000e72dd6c147e6541d1a2f3afbd3f675aa552e3f406e94038f59af9fbca9dd453945e164a12a3d56227ed03d1cc6063bc4988a6fc20b079a5cc5a61b48b51fa73f0c262fd3f373", @ANYRES32=r0, @ANYBLOB="969d0000000000002e2f66696c653000"]) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) r4 = eventfd(0x0) dup2(r4, 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd=r4, 0x0, &(0x7f00000001c0)=""/46, 0x2e}, 0x0) r5 = syz_io_uring_setup(0x2a7b, &(0x7f00000002c0)={0x0, 0x6180, 0x10, 0x2, 0x356}, &(0x7f00000a0000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r8}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_POLL_REMOVE={0x7, 0x2, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1, {0x0, r8}}, 0x1ff) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:49:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000010) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:49:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100003007) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:50:00 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x38, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:50:00 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, 0x0) fallocate(r2, 0x60, 0x2, 0x80) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) rename(&(0x7f0000000100)='./file2\x00', &(0x7f0000000200)='./file1\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r1, r3, 0x0, 0x100000001) r4 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r4, 0x8915, 0x0) dup2(r4, r0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:50:00 executing program 5: chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:50:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000006) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:50:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:50:13 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x39, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:50:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000007) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:50:13 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, 0x0) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x80d018, &(0x7f0000001e00)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYRES32, @ANYRESDEC=r1, @ANYBLOB="7070008c708c8a339574e8ddc43db70974bab4f4f74910fec57b343f793eb0637c59ba8515ee7f9dc826b3fd6cccf3a31ea9a5624668ca3eda0b73e64f4f8a38fc982299f79cb2d649f7c83e7640902a9b8e37f216e23decd21cfcb4401145c97526826551fbaf5189e5a21a6a7faa61cae0dda9d6626f89a4afd8d866767ed8aab14c7e161a7d216fea78c8d1742424209a1aedb41e71dd26f91d35ba92a7cceaf49c962ac77a7fdb0ea4809e216c51221b37ab947ee7fdce34d1a22788c2238332793b513495c85ee495acfb1609837fedfabd679df94da32a9cd4fa160b95a6a5481071cbf498fae2adf00b530b9d21ddee9fcee852f536990b2940796996fd65ebdd414611ea998200db9889aca44697b7dc5d4600d0df89fbe50435c17cdf15bb6ce729e785799e9b19b3452a68b04e7b819a9051972d5ff0f2fb07d0de1f8aad0af167414f1fbd1c7bb802e060b6c8fcdf9c6f924f2d0fa3f1e3be6234de376b444eb72e3bd3f50f1f546252a04df4accde75707cbf5a1f18f1aeff4821331dd9b9aab09e33960a1464257dc402520b82e95db83f60410aa019c3ee78829757e5e85dc3d10f6d879352e7c374a0e883093d895bb3c7f57666a847134606c3bb66604739070047ea02ffc62859818d63d84dcbd233b925c9d57ba55c4773519d269e2bad59468a05c8512b31bf2586b327bbe5ba143ba8c367d2b19dd82bd64049d3ba443e91ab39ee2318d7e6da3063e7906776a1866b8405e5852a85f980744e8f257e5ffe9ee926d85cccc44e440e966ed861ffbe8cb11858d79137104598786d0d7f85ded86ebf0326f039d33a308f4519ee263c92bbf487da42f51d1b7546d6c26a228c315ec682e9ac7d6ee932b628d5eb5f3b70735895e05c6cefa087ac2bb67f5d0f1a99e5eafa2e816262164e1a15c0d92122cb893230365e9e4efac46f095cd90d8d847bab0ca47b2cdedcd4f20422d68821761689440c2c90f2df28cba467445ad7091ee818e88e645212171d0e92fd3ff414ae58dc973fc3520dd5706a67a3b2f496455549e5ade92260a246fccde7ae412500787885397fb8d86d51618ba7f06e7f4025d4338db7c515f0dd59e986b009ef410991c22a2111eeb56c56bf4b1029f1c418fae9c3fc8fdfc653c7461d5284d92c4ac86eba5892985c28d84906172e92c505b31e21f1ade96bc1dd89917344ef2f8566e22cd2ff7f9b02b699c0501031f814a3b63887be6ca0758d12a4875e88893b2b36df681b1bffbf19df017a7ecaaff138c75e42f915221e8cf896d761c758a14520dfe232fe29c9a652cebb19cdac2858b44b509a20b27fff3762d46a1d527561f5c96dfdd90be32dea46247ba83a5b64c6ffe9c053c11e11c981593a11c5ed5d99553dce713b08bc0ddb1e6301fe67f38d3563595c1239a5e82bb60500292ea302150e3a3d00cc1adb367a45a90ae8c63c5648dd407bb04934f048d8e1787dbf2fe745ad3b8c99146d3f8d83b555b140cad93a690be1b5328f08dc9d8dda01e4cd2d8d1259b531f9238d90b4120fca6675c800d29850bd540a083bade1ba80fb7d325daa61513e736b61cd499539033fab20ce7e396dbe2b9e70aa907429987c1a57cef3426285faa798ae07c2c718609996ce070432c80be6934fce7d510ed9aac71cdfba3d7af62e2fa71cfa4fc5aec4a6bebaa1bd2ce0968ca1f55a5ce13236da87e346153a5a322c7fffef642937cc18459f5caf8edcda67a50dae5e533150162b5a43ac66fe6e3660f9b1cde1a3cce66458685710d9952f0dd9ec343e9e522b845e1dcb1b867ef5b94a80ab25d32e2ef3db0f2f14eef16367e06c225ef4f2cd5918060c10279d8fd741e7d991663d943967b4588b3c01ad23a2220e2248808e2b383e8c5c1cd6420d62e2d323e782b65fedc4a0a20fd0c1dec5b48a70000fe580d94ff9c2390c0a66bafe179ec48924f7739b3eab27fa2b6bac8aaecad569cc42bd3395b46d66beaaac548d14824006e79eb99629cc17fa1d77341d8f771ae22966533d1b11120dc1e29383142cfb9c64f63b7c0b04879164964c8fa6b7db97963e45a473b6b0f6ace3fd6ef0a76ace98e493bba25d0ec98af8791a8f60173433618f0bc96dee54e66fbdaf872a9fa31f307c62395f9545a8385263031283bf195272220d63985038cb76149ce2e9a2c5a5109dca52e9535fd69cf61d1bac8c2cdce6f25cff3525df001ac79715e4dc9dace9242de9a8e6c9f917d5372acb6b52aaa2cd149917100025909a01bf8df3d7874a682244389c470d8c1186260c80f08cfe90cb8d464b1777c0ad50b4a5e8c2c154f032f73944d358337bc6beabdec232f03443085787af20f23bef85ae94354eaee8c84376334c28766671e1afcd294153fb9f4d59b8be3f870e83f53f2bc4c1c7108115295dabb3ad147e815f5936c64779ef767644eb09cf5fcf41d8aa15df9c03c012375b87210d85eb0aff29b1eb5719b649e5bcd15dbf918b28f6e53b37945717a0012e1363c0bc8931e1ac72c97df758577f3c62a2781801d7b93279bb1f9f1293f04a4583186746c3cd61961bca5af80c7f59434f3ac63de923f22b897c75df3766da238d6e7df8e73c0036e15940228c1019d08bb7097904112fc3bb01b396a9b814f9fc69cf2853eb0251f55265fea139f1d6c7b8b1e4a455006bffbc038fcce0ae3b839a1f924371ff00d8cd7527c0871096cb21c4d20442e536869b8b7044a58b29d13f24847003d9cc63dafaf5ae8583a62f0baa5df4a7ffbafde1f5fb601f287e72c9ff4e23eab00504bb99598d1f8018a9cb3be8f7a656ccd204e291e991e1f165a88a25291e2b574965507126c0d1f7ebae22082b11e6c86b8170e5de440324157b4f18a61b204b9e64bf7839adc310a6e6d4e984ce4692be35790beff8e3c2bf221ecfdd7f5f70cf6f9355c38a9d3e32f2190eb192665629d76ca806c60a51cc69ba26451d6753ba9535d3bd8c4d49d13cf5a8889a4b40a34382afb7d1b85232eeca1bfcb33a8235ed0f173f09f0d0700106b211f6b0a762931cb8e80499c873bdd5cd913071dd42f20902b4e2bfbe564b212577201f9be9fceb6ed0b75109be9058ffad7fa59fe953a0148764b5b0ca7b30e41263eb6116dc0d4f3e3adc91323081c06a75988ca98ebd8341bb36903f101ab3f41cbd815a04ee8092d1f2e84c1591ea84c67899cd0647faf9714102f3a1980fc3bd4379f6223d93e76a1d0a7e521013b7e83b281c6710ce3f96f232bb13ff4447c1dfe202bee5c491975976bdcb555638ddf51cea3824ff7224d3fd920ef160a887852f0cc32fa58d2f11be3bc8dd240deb5441ad438da69db3a758115de4e32d2a589ef811ace5e4ebafa10a9db6278a251d04beaaabda1ee4345aca5af091d53f2cf591d4ffa317894f83f8d757ca7f839ccc61cd8b19384147d90349ebbef1835c0b59c8c130698f164d2cd43418518756f0e53a1f778eea97dcb0c8196d10cd3360919cfa59cc9c6ea21a99a394df14b5e0b37cdaae7920119449e42526256ad19838bd0e7a63eff6ba3a5ea26e35e31d865edf2cbf17a378ce0a10f7963d7a0d0f2548769ca0749b223218360813ad89b744f127ec296b003c0618a014bba793391a125280dd6805650cba62233f07c6e4ad9c0872e411a00341e9a45d0c8faac711dcca1e91642649961c341a7ec3dede945d3446666f270d6c6dd0f835e4b3bfc32e396beaa0e7bcc360668afe4d65f6f3a789e693b7fc5687ef773ae5d0c7cb4a37b68bd2f2b6f38ce91ade0134afec55252ac33da4b7827611e6096ce5e9b693de7581ef32a31432cd6030dc58e706908fac8eccb6d8f77a127cccb29cd80a4477d9c749373ccacb7ae416105b4f694da0b43953cd7cdea3114bb58b8fcc1873d035c2a302f895522fa1b656a748249a41bfc35d23ae4cf55b74299e458f07733a3e0d7678ad376e6310a505e309e662d56d0e015635559d730c486c0f0e909342305616f5fc327c97e90a9a54244cb7c7a5944c03f84475176e563fec9910f98c2c9b54e709fc18d3d43913852967dd69c7c38fe26719eb3e2bf7d7b23dc4f0d1f12bb07369a55f8c7188d0711cd016d3ec78f2ecd392d0c2a4be4cce3f78a5e97c1b8dfd3eba21ed45b018eaeda2036f2738b0a6e049027e49c3559653bcbf74daa7e25f62f35b4335e3f4b127870a21750345969ab47217a09d5b34e7df284d75816a6c67e3852039f6f1cfa186a4e051f8ab8d920715bc1cb9454d40e13e4d53cbb2a34175b60aebcb49284c3de5fef97e13faebfbdf4ddea349b2a291fd5b7229526360cb213973d5a0e546643182b1bce80e556dff77c021623953ab835d3f39aa60085fef3107db6d21efc21d6de0a986389a461691ce1e756bec6cf9c632098432ce22a3278594395d72e7f0264b443edda5040d106a11a320944eb053f678482b04a93221463fa5516972c628be2a96c0bf6fce0f913d3073aa26e27964b9d0f841e04d32e5e3c603b2dd04be6c603d3df07093c63a524fb3a20f7ecd8db89cd6e086553698b8972464f819e3cb4107195cdf512c4b7bd8a870eaa5338d6fa42d436e14e8a29edac12beb86a234093966b2ffc30c6b2fd7c99aebce6b6c24fb62812ee0309a2dedf529a616690091706a35b7879c0458a122eed00c5b80e8b0b70f1eb94f7eaafc20c9332199da4ee02b5aeaed9e06267288ef8aec1b5a0af424c910d8d38de07cb1a2915c378692f7273ebb613af6936b293a53a2433093bc8ecdfc65c85824b5bd9086aeb9899f3d328fc38e274113e9b854e6222e23b1bcec0513771db57ff4bd06f7242d51f7de7d80a21c3e69b24ea3f20cc4f67ec51092f33c07a70a2b8164c061ee981da0cdc94cc6f7bb9925d05f24ac693159c157372a1954780f5dd7692b8f6946910d9af3e0dbc4813e607ac4f965ca0b0f8bc470bebc6bd2a52bece57897ce81ac704c87c02420c9a6ef6d1a39d1c4f2cdb2066810d4ed08bc840ab56b9e5ae5941ccbebab839d39f3efc441a1d92af100f2e0e35d810acd700909c8a9e8f1715ed67f4b6b713669dcd9dfe3ffe180972b44ab480ee00b278507f6241f947b3e140598863beedcf59cd32dcda2e0eeaff33946389ce4b65cf63fbba75720529bb1448e988aa10d01fcf209202c8678d3db0bb0024a048b474f27b948588a4463570c57d6cd6fe32419d6d42e760f6aa590050dbad919ddc5c58f977dc1ba282091a1d39bfbeffe8d4fc273433714c2b475889f0c4b3739ce89b27e7bb7ebd36fbee928afad12fd0ac0d3c1d447bf8e7825a64c83d07cbc0d0fe59f871c6b11234b8d789e681d5716ad6cf31fe74e9021630aeff6e8a4ab175afc37bcc4ea6bd8ae20f3ac7200ba25e29b142949bbccf632180c4db2aebd463958a17ab35f2c8ee102f3c2b97069d8f8b79b0bcf8693b4a054ab6e47d1ec76475cc1810fde0fd7530f6819b52c1f67238ac85773c949ef3173a37bf02480cab5a7529a87637be38471fb9da743ecb8ef67b2a0ab7127bc6fd3076d88eb3f03387f8af8bb08a1d2eecf30892322e81927cbe95be9a4c1daf65e2396923eaae9b774f01e721852ab495c93cba74ee225ea7b4d37f46073b1bfded4635f8a074fa1398ac8396942e6663274a41fc244ef3e8e6f8562dc0935679d56a951c95166bd0f77c3e11cb60d4d46394fbfd823c638914a5ff90af32ec41946c5656fc8f03c8dcc27cc507fe9e2ba420a003d1cba753255634c3e310ce64924e478368"]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x440800, 0x80) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) lseek(r5, 0x0, 0x2) copy_file_range(0xffffffffffffffff, 0x0, r5, 0x0, 0x200f5ef, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000010000001800000000ecd70c6b60594dd14c425cc5af264857982aaad67ba58d9f52e95b30cd2a50967b586c38f537d90bcb160de579cee50e6bfe9da0299e5e38b8b026ef6c639ab8a53aa27a62a6301f1dbd1011f6db88183cd27a35a27eb93312806371fb11c02ca48860282465c43ebb5bc4b758", @ANYRES32=r2, @ANYBLOB="bb0000009a0000002e2f66696c653000"]) fallocate(r1, 0x0, 0x7fb, 0xa3ea) sendfile(r3, r4, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:50:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10fffffff) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:50:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) openat(r0, &(0x7f00000001c0)='./file0\x00', 0x80, 0x20) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:50:13 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100003014) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:50:13 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000011) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:50:13 executing program 4: syz_mount_image$vfat(&(0x7f0000001a00), &(0x7f00000019c0)='./file1/file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x3}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0x7) openat(0xffffffffffffff9c, &(0x7f0000001800)='./file1\x00', 0x80000, 0x1) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_IOC_PROTOVER(r1, 0x80049363, &(0x7f00000001c0)) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001840), &(0x7f0000001880)=0xc) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002580)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(r3, 0xc400941b, &(0x7f00000000c0)={r4, 0x5, 0x20}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={r4, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r5, "b76a24f24ac24227549f48ce1baee3b2"}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f00000018c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001940)={&(0x7f0000001900)={0x34, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x5}, 0x0) 18:50:13 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x3a, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:50:13 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = dup(r0) openat(r1, &(0x7f0000000100)='./file1\x00', 0x0, 0x22) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r2, r3, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) r4 = syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', 0xffff, 0x1, &(0x7f0000000300)=[{&(0x7f0000000240)="128ac5f67f65dd6cc3be724cbe719a810f0729c9bb39006bddbb192b084e38", 0x1f, 0x81}], 0xa400, &(0x7f0000000340)={[{'vfat\x00'}, {'\x00'}, {}, {}, {'][&{'}], [{@seclabel}, {@subj_user={'subj_user', 0x3d, '\x00'}}, {@uid_gt}, {@appraise}, {@uid_gt={'uid>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '%'}}, {@uid_lt}, {@subj_user}]}) openat(r4, &(0x7f0000000400)='./file1\x00', 0x8600, 0x10) 18:50:13 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x3b, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:50:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000008) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:50:13 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) syz_io_uring_setup(0xcbc, &(0x7f00000001c0)={0x0, 0xb609, 0x0, 0x3, 0x1e0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000240)) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:50:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x20000, 0x0) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r3, 0x8915, 0x0) tee(r2, r3, 0xfd, 0x5) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r4, 0xd000941e, &(0x7f0000000800)={r5, "b76a24f24ac24227549f48ce1baee3b2"}) 18:50:14 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100014006) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:50:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x2}, 0x10900}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0xf5, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x8, 0x1, 0x3f, 0x0, 0x0, 0x8000, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x4d01, 0x80000001}, 0x1000, 0x9, 0xfff, 0x8, 0x3ff, 0x0, 0xfffc, 0x0, 0x800}, 0x0, 0xffffffffffffffff, r1, 0xb) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r2, 0x0, 0x100000001) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r3, 0x8915, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000340)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64=r0, @ANYRESDEC=r3]) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:50:14 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x3c, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:50:14 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000001840)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)=ANY=[@ANYBLOB="01000001010000", @ANYRES32=r0, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB='./file1\x00']) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x4020, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9}, 0x0, 0xffffffffffffffff, r1, 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000700)='clear_refs\x00') r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000014c0)='/proc/bus/input/devices\x00', 0x0, 0x0) pread64(r4, &(0x7f0000000040)=""/4126, 0x101e, 0x2000) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), r3) sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000001840)=ANY=[@ANYBLOB="7cd55fb116d7371dbff105467c63374688c138d164df7a47477dd7e04478fffd13806c380dd33387046d1c5f9b8e", @ANYRES16=r5, @ANYBLOB="20002bbd7000fcdbdf250500000008000400060000006000018008000b0073697000060002005c000000060004004e2200000c0007003100000010000000140003000a010100000000000000000000000000080008000900000007000600666f0000060002002e0000000c0007000200000020000000"], 0x7c}, 0x1, 0x0, 0x0, 0x24000084}, 0xc010) sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)={0x68, r5, 0x800, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x400}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e24}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@empty}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000081}, 0x800) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x9d96}}, './file0\x00'}) ioctl$CDROMREADTOCHDR(r2, 0x5305, &(0x7f0000001800)={0x0, 0x7}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r6, 0xd000941e, &(0x7f0000000800)={r7, "b76a24f24ac24227549f48ce1baee3b2"}) 18:50:14 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000112) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:50:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x5}) openat(r1, &(0x7f00000001c0)='./file0\x00', 0x0, 0x8e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r2, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r3, 0xd000941e, &(0x7f0000000800)={r4, "b76a24f24ac24227549f48ce1baee3b2"}) 18:50:14 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x3d, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:50:14 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) getsockname(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000100)=0x80) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) r3 = openat2(r0, &(0x7f0000000300)='./file1\x00', &(0x7f0000000340)={0x214603, 0x40, 0x16}, 0x18) openat(r3, &(0x7f0000000380)='./file0\x00', 0x2, 0x10) sendfile(r1, r2, 0x0, 0x100000001) r4 = eventfd2(0x9, 0x1) tee(r4, r1, 0x5, 0x2) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="969d00000000f1e692e800002e2f66696c653000"]) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:50:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x5b, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) setxattr$security_capability(&(0x7f00000001c0)='\x00', &(0x7f0000000200), &(0x7f0000000240)=@v1={0x1000000, [{0x0, 0x1}]}, 0xc, 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) r4 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r4, 0x8915, 0x0) accept(r4, &(0x7f0000000300)=@can, &(0x7f0000000380)=0x80) r5 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r5, 0x8915, 0x0) sendmsg$sock(r5, &(0x7f0000001d40)={&(0x7f0000001800)=@generic={0x6, "1c2a22cb7a1306e8864d6e14df9b9fbc5943050ad4680104a10988e838aebe3b9f06e87fe7d6edfa7eb645640b70c40fb5a70caffd6640606941ad489138f83a2219a3f536f4730a46941d0523bbd2e56ddeaaa0f5132387c73bda82e16c0d1ebc0d3f9c8c71989e9fece51db503d74de018e6df74471b54d15436e19037"}, 0x80, &(0x7f0000002100)=[{&(0x7f0000001880)="990fbb027518284d5cef0b37a7ab55e7d53f2e3e3c8acf1f889a186d77ea0b0938546b54074ddac17f31209b9678267e074e461a09eddf7fd0c6c981846fc14fc35a45f59be6db0b5dc3efb314b5f6e02b892f6d9b43d44a8a43b11ec426580d5513a1142cbee6d61969b119095578af6eaffb02f2dbb9752fa7068966dd763f1425d042a392f65f624b3da82a560dd7fb125f7e0b33b3dbb2a976345f2248cc8adaec6113ad050b186de6", 0xab}, {&(0x7f0000001940)="7cfbf0ef4a69a3bca3356d56256b7be8eb0e1753fe1dcd0e46aacde601edd8d75569f7c340ecffc902207b68a373603e4f3189233f4797455cdf69be4a3b65ab7db10c37dce6cbe04109968a60d20ea84753daee80caafccfc0a2de8af009626822b15dfa440171ef0772f3ef831f39fdc58fa101e68681afdfe4256264c5b6fad87bcab16ea89b053edf6dfec03921cd336c6a09604e047f547491ae3cd9a5bfe0f2efa95cfc0effb47f43c69e394267ad417ff9f2ba42be96ad71fa4b1d405a2cd24c09a0209d72809c556bb8f6bbff5a436887d02ab945549", 0xda}, {&(0x7f00000003c0)="a39bbd4e5167963f4d4b46c82e8e4e38eac317699fa7e0a6b124c1fa17f2d583d23c2505c26ab0907fb1b82426e25c72", 0x30}, {&(0x7f0000001a40)="97ef682e2c8b85da7feb384f13e7b14df34dd5d790a638f7601ea145ab8c0903f920e40aca29734d3817ff16075fcda4445906f12543e9a1cd4417177c85da6c94fd99e224d6658126a515074f6f87b6b5f751402fe034f079459b65e0e922afca77610953af86ab3cf59aeb11de9ed2497d4e0d34a52fa3f47fdfae63450868ae4a142e43b58a759570a3fab639e3aa02b3aa0ebbebd5357ed6d8800e7c330506971fe9fc0be8e93c5837ff74108ee90d5013453ddcb6744a7104f08d1c9ce00edb228f15a14fe499a73ae6f15208923efdf37ca287ef8a14261033eeb4125c0c11acad8cda3327", 0xe8}, {&(0x7f0000001b40)="7d014c9fbaf89428d74d42f4f80b855ba4f347f995325bd50cc5bd3d978e3e8f93757c6b1698069f64301e673e50af923fd879c5278c0772a51a34392f57c26adeedd6e217daf5324489d55c2628ebc1764b67821571ce33f35339f0eeade6b2fd6d5360566784ece44cc89308b793fc3b72cb5773c5cd4b505dfcef7a9b472b9d52b9c07819c13ba2f5527889ccb75e3d5e711cee04d3a18d55cceb8b835d3d2ae9c9f0861abb81f0140f96cb7f2bfa03ccc5e22bfedda12ad86ab7d23fabbe8781a5a2b5311c77c32a142ad8606c96303168b06b41076131ada6f7b3728cc72b3ce88b4967cb8639799e51a3d2908626e9", 0xf2}, {&(0x7f0000001c40)="c9059d898083cee4d15d41f4008910116b3a0c417c4cca2e6f45635b609673198e0f94c703f26edd63e3a4ff55c84c9c63561c700ece9565a054944b23e13b61bace8e1d66dcb3bc88ba1cc3e273371378f49db1f2667a025de511a2c8b1ed4cb682d5d9f5ad97573e1bc04448888c88d7db7fc47204f11515904224140b3bf846d0b31970d2a312f4f0e2102223184bc09aa4dbf796f44f993c8cd7295cbcba98fdcc05cb69a0b0a1cbce659d2b1661470ac4c6d03f6eb8d09b75bab0c3358584b49da6c77991bc7094334a72547b9722501dd10b0d5b3117db10", 0xdb}, {&(0x7f0000001e00)="546d2d9325ca72b0bf66cefb57a80ed03af9e88f1595d7dc4aeb32523b2b7144513a937bf9caef0314e713758a3d60cd2f718e7313597456b84cbbaade4f70348f17a98b24094d65350786a645d86cef7f816aa254d2a4b967b84f68d3311bf2a85b7786e631115eb32e0cdb3a869d2b737a5ead4a31a45666c7e298ed0b78f5d0432524a1298c258dcb284f6213ef676be5e1de59231beaa6a3dc99bfb48b421dbfe3ad", 0xa4}, {&(0x7f0000001ec0)="af9b8053a423b8a08021d4fee635e437d710f3c18730bb89e74ba452333fbe1030c64c12031b7aad0c7397afcb4255db288fc89b624119cc204087307bfd18ffc12d1b9e8399e20d111a9c097199ea6f5a8248506cd0a515cac740646da07bcdfa88f67843786359301c6e2f68351b1deb3a8b1d2c39b51a2bbf3ecc8a1c6a61c2", 0x81}, {&(0x7f0000001f80)="707d24f462ca6bf5156c0ed985ce94130e78570243f92e4f309eecc32b28f8f87a3160f413eac033204f4e1d773d95731dd777401c5bc088cbd302789b6dda4517940f1aa73b0f26fe", 0x49}, {&(0x7f0000002000)="630185be9301240a0c073c80fc37cbb4733a3825238dee9489073c7e32661e755654fc118cabc3a96381faf575a65d1689c809868199157cd8de8116ff1df61316153cd4e8f04799dce1dba28c039bc0ea9498adde4a132fc1fac499efe531248a32243124a6e32b9b59291985a43702727fcee35ca68aa159a81763af40701cf1d642abe1a7aeee4909616dbd8a09bc126d7639337cf2c92e1588db09499812c24a2133041aa2bf15ebb56bfb6d0184bd9cdb57ec91d7e0308c06499150edaacf7b3869bf2a2de829e74e2093bc3387", 0xd0}], 0xa, &(0x7f00000021c0)=[@txtime={{0x18, 0x1, 0x3d, 0x7ff}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x1ff}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x14, 0x1, 0x24, 0x7}}, @mark={{0x14, 0x1, 0x24, 0xfa}}], 0xa8}, 0x4000000) 18:50:14 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x3e, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:50:28 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100014007) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:50:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000009) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:50:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:50:28 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:50:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x41, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:50:28 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') unlinkat(r0, &(0x7f00000018c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r1, r2, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x4, 0x18) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000001000000ff030000", @ANYRES32=r1, @ANYBLOB="969d0000000000002e2f66696c653000"]) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r3, 0xd000941e, &(0x7f0000000800)={r4, "b76a24f24ac24227549f48ce1baee3b2"}) creat(&(0x7f00000001c0)='./file0\x00', 0x1b3) syz_io_uring_setup(0x77c4, &(0x7f0000000200)={0x0, 0x768d, 0x8, 0x2, 0x33a}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000300)=0x0, &(0x7f0000000340)) syz_io_uring_setup(0x6a3b, &(0x7f0000000380)={0x0, 0x2b71, 0x0, 0x1, 0x1a9, 0x0, r1}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000001800), &(0x7f0000001840)=0x0) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r7, 0x8915, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000001880)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x40002060, 0x0, {0x1}}, 0x101) 18:50:28 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x1000001da) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:50:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffa}, 0x48}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) execveat(r0, &(0x7f0000000200)='./file2\x00', &(0x7f0000000340)=[&(0x7f0000000240)='vfat\x00', &(0x7f0000000300)=',%@\xd4\x00'], &(0x7f0000001800)=[&(0x7f0000000380)=':\xd9(\x00', &(0x7f00000003c0)='\x00'], 0x800) acct(&(0x7f00000001c0)='./file1\x00') chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) creat(&(0x7f0000001880)='./file0\x00', 0x205) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat$cgroup_ro(r0, &(0x7f0000001840)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) tee(r2, 0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\t\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="969d0000000000002e2f66696c653000"]) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r3, 0xd000941e, &(0x7f0000000800)={r4, "b76a24f24ac24227549f48ce1baee3b2"}) 18:50:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x42, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:50:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x43, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) [ 2547.016376] Process accounting resumed 18:50:28 executing program 5: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000980)=[{&(0x7f0000000300)=""/77, 0x4d}, {&(0x7f0000000800)=""/199, 0xc7}, {&(0x7f0000000240)=""/2, 0x2}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000000900)=""/126, 0x7e}], 0x5, &(0x7f0000000a00)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x128}, 0x2040) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) [ 2547.093725] Process accounting resumed 18:50:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x44, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:50:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') renameat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000300)='./file0\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r1, r2, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="969d000080006c653000"]) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r3, 0xd000941e, &(0x7f0000000800)={r4, "b76a24f24ac24227549f48ce1baee3b2"}) fsetxattr(r0, &(0x7f00000001c0)=@known='user.syz\x00', &(0x7f0000000200)=':[^+$\x00', 0x6, 0x0) 18:50:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x45, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:50:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) mount$cgroup(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={[{@cpuset_v2_mode}, {@clone_children}, {}, {@none}], [{@smackfsroot}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x10000000000}}, {@audit}, {@smackfsdef={'smackfsdef', 0x3d, '[]--'}}, {@uid_lt={'uid<', 0xee00}}, {@dont_hash}]}) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write(r2, &(0x7f0000001c40)="2c04450cb03c7a7c183ebc0eb803e73c887aece72626c744630042ce6c554bb12860bbef3c24d2782a1323469b314c3fd9d6f492436281947bc95b4209dad8f52f9c018eb15fcb0c528c99b0a8c4b3271d967d3b48f8fe65064190488ae71976497e1f146ecce3a5edc7f321a05642f3ab75cefbd57ca2ebfa64c238c819ec4baf665ef12416e61c6826e75fffc910b93682bc0b2eb6c73015e8b98e38465b26e17a21fb347568e2292a16f4b73773f1ad68561c74089bb7cb3d06fa82ece022ba4bf106b311e8532680917e1d1fcf86307706d1bd27e2798b9c241a8b", 0xdd) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$BTRFS_IOC_GET_DEV_STATS(r4, 0xc4089434, &(0x7f0000001800)={0x0, 0x8, 0x0, [0xffffffffffff61ca, 0x10000, 0x87bc, 0x7fff, 0x6], [0x0, 0xd60, 0x9, 0x80000000, 0x9, 0x4, 0x6, 0x0, 0x1, 0xff, 0xfffffffffffffffa, 0x0, 0x8, 0xffffffffbe8b9a28, 0x147, 0x3f, 0x10000, 0x9, 0x6, 0x8, 0x40, 0xff, 0x401, 0x7fff, 0xff49, 0x6, 0x10001, 0x10001, 0x1000, 0xff, 0x3ff, 0xb5c, 0x8, 0x1, 0x3, 0x2, 0x6, 0x0, 0x7fffffff, 0xfffffffffffffffb, 0x4, 0x789, 0x7, 0x7, 0xe92, 0x0, 0x5b7244ec, 0x0, 0x4, 0x3, 0xda, 0x40, 0x9, 0xffffffff80000000, 0x1f, 0x200, 0x6, 0x7, 0x5, 0xfffffffffffffff9, 0x400, 0x4ec, 0x8, 0x7, 0x8, 0x40, 0x1, 0x400, 0x9, 0xffffffffffffd6c9, 0x6, 0x2, 0xfffffffffffffe01, 0x3, 0x80, 0xda2b, 0x3f, 0x4, 0x1, 0x6, 0x7f, 0x9, 0x6, 0x7fff, 0x4, 0x2, 0x1, 0x1, 0x80, 0x400, 0x5, 0x9d8b, 0x9, 0x7, 0x5ff3, 0xdf56, 0xffffffff, 0x0, 0x5, 0x1f, 0x0, 0x10000, 0x100, 0x2, 0x1, 0x2, 0x9, 0x1, 0x80000000, 0x8001, 0xff, 0x0, 0x7fffffff, 0x6, 0x6, 0x4, 0x80000001, 0x8, 0x0, 0x100000001, 0x2]}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r3, 0xd000941e, &(0x7f0000000800)={r5, "b76a24f24ac24227549f48ce1baee3b2"}) 18:50:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1a3940, 0x108) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) pipe(&(0x7f0000000240)={0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000300)={r3, 0x2, 0x200, 0x200}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="0100000001000063483093c54b76ad7031c01926a0606ad96baf8ab25d86b9b53d2d45b8098c20937c93081c0ee9e09c00"/62, @ANYRES32, @ANYBLOB="969d0000000000002e2f66696c653000"]) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:50:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpgid(0x0) perf_event_open(0x0, r3, 0x9, r2, 0x4) r4 = dup(r1) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x3, 0x9, 0x1, 0xf0, 0x0, 0x3, 0x44, 0xa0feadd2b7579ed5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x3, 0x4}, 0x8, 0x1, 0x10001, 0x2, 0x200, 0x8, 0x4, 0x0, 0x4ebe70cf, 0x0, 0x8}, r3, 0x3, r4, 0xa) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="91647c5a6fe7b60100020001", @ANYRES32=r0, @ANYBLOB="969d0000000000002e2f66696c653000"]) openat(r0, &(0x7f00000001c0)='./file0\x00', 0x2, 0x100) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r5, 0xd000941e, &(0x7f0000000800)={r6, "b76a24f24ac24227549f48ce1baee3b2"}) 18:50:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x1000004f9) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:50:41 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100014008) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:50:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x10000000a) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:50:41 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x46, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:50:41 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r2, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r4 = open_tree(r3, &(0x7f00000001c0)='./file0\x00', 0x1001) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000200)={0x9, 0x10001, 0x100000000}) ioctl$sock_inet_SIOCGIFADDR(r3, 0x8915, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) 18:50:41 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x47, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:50:41 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x48, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:50:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = dup2(r0, r0) inotify_add_watch(r1, &(0x7f0000000200)='./file1/file0\x00', 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000001c0)='./file1/file0\x00', 0x30000090) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r2, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="969d0000000000002e2f667f77ab6aa3"]) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:50:42 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x49, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:50:42 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x4a, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:50:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYBLOB]) sendfile(r0, r1, 0x0, 0x100000505) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) 18:50:42 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) mount$cgroup(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x200020, &(0x7f0000000580)={[{@release_agent={'release_agent', 0x3d, './file1'}}, {@xattr}, {@none}], [{@smackfsroot={'smackfsroot', 0x3d, '\x00^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/^{})'}}, {@dont_measure}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@context={'context', 0x3d, 'staff_u'}}]}) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x101000, 0x0) execve(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000200)='%/^-!+\x00', &(0x7f0000000240)='\x00', &(0x7f0000000300)='@\x00'], &(0x7f00000003c0)=[&(0x7f0000000380)='\x00']) lseek(r3, 0x7, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000800)={0x0, "b76a24f24ac24227549f48ce1baee3b2"}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000004c0)={'wlan1\x00', &(0x7f0000000400)=@ethtool_rx_ntuple={0x35, {0x0, @udp_ip4_spec={@multicast2, @broadcast, 0x4e21, 0x4e20, 0x3}, @usr_ip4_spec={@local, @dev={0xac, 0x14, 0x14, 0x33}, 0x5, 0x5, 0x1, 0xec}, 0x8, 0x40, 0x9, 0x6, 0xfffffffffffffffe}}}) fchmod(r0, 0x20) 18:50:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0xfff, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:50:42 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x4b, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:50:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x105502, 0x5a) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000001800)=ANY=[@ANYBLOB="010800003cea466201000000c598b177ef63be4d8fc982254bdb3d334b43048ba4f5d2d3fbfd6a9d41ae5d37bbe877a2c1bbff3c2c1225bc1fb9a8c5689d3f64fa9f78f45796bc480e2915149fbe8c7d429b23f47fe5c715d4bd6a48e255952df465daa110e7db79e1f04ed61f868b9b2569d50d05f38a80600ee87fa38ae7ba4fab787bc496b1ba93e8913418382ef20871323d450148175d1e7946fab811d6be71d71d3ac0054f7f080743d1e9c7018715c530", @ANYRES32=r0, @ANYBLOB="969d0000000000002e2f66696c65300007450be650fab79056e99dddbb9e12e7ebccc4258dadcaa3cbc05207f1868afeca587853c3de112da0986b08b889e7502b34133bfa2312ef65f2ee9f843c7796dcd04fcf8d474ac39deb492fddd877f8511e65e7f25b1111ca9f88fd8dd58d7420f42c4cfb1836dc"]) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) 18:50:42 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') lseek(r0, 0x0, 0x1) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) recvmmsg(r3, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x4c, 0x20000022, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f00000001c0)="79c9a55fadc241aa85fb5d4d29e20e913f0df4c030d81a3f64425d52d0d4b2826a0a3cd410ea7b1900e4dd100a79abebab228f0120d203bc8b48a323c9ac60cbcb3a86805cbba60bfe9f38839276", 0x4e, 0x0, 0x0, 0x0) 18:50:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x60, 0x0, 0xa3ea) sendfile(r0, r1, 0x0, 0x100000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000001800)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="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"]) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) syz_io_uring_setup(0x25, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2}, &(0x7f0000fe9000/0x4000)=nil, &(0x7f0000fea000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000000)=0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) r7 = eventfd(0x0) dup2(r7, r6) syz_io_uring_submit(r4, r5, &(0x7f0000000140)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd=r7, 0x0, &(0x7f00000001c0)=""/46, 0x2e}, 0x0) syz_io_uring_submit(0x0, r5, &(0x7f0000000300)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x5, 0x0, r0, 0x0, &(0x7f00000001c0)="dbae23b99cf3202e2fb93a0dbaa5fea6699a77b3db17e69a5cba47ad683a29d864b32a5775d72356703a557cefa4251e5323e56cc64a22e44a12a97027fa2a65a036732b64dd3abdaec6af752f161217ce0d8b884d2289c166d464e83348eae27e70e2f88105d00a9d42784851738e9a6e1ec3843d6f428e2a415b6a470c1ec16edf90c5c747d5c5afd17fecacfe27d681a3af31c92272634500ff", 0x9b, 0x101}, 0x7) 18:50:42 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, 0x0, 0x0, 0x1124001, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f0000000280)='./file1\x00') accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000a5b4a299584a5d55724e27689881f04a5452ff4da0e2158e1f2395fb2006846d14d273773e116e25a92efd4a851e33583f2877662f66330e66eaf7c7f9d4bac345e748f64ec507ee", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r0, r1, 0x0, 0x100014009) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9d96}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000400)={0x0, 0x1, 0x1e4}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000800)={r3, "b76a24f24ac24227549f48ce1baee3b2"}) [ 2561.688783] FAT-fs (loop2): Unrecognized mount option "n" or missing value BUG: leak checking failed VM DIAGNOSIS: 18:50:43 Registers: info registers vcpu 0 RAX=0000000011a66751 RBX=00000000822f3a41 RCX=00000000a66e6616 RDX=000000000f390ec3 RSI=00000000a66e6616 RDI=ffffffff8689e180 RBP=0000000000000000 RSP=ffff88800fb27b88 R8 =0000000000000000 R9 =ffffffff8685f787 R10=fffffbfff0d0bef0 R11=0000000000000001 R12=ffff888009284ec0 R13=ffff888009285858 R14=0000000000000002 R15=0000000000000000 RIP=ffffffff8126bef0 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00005555564c9c98 CR3=0000000037d2e000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=0000000000000001 RCX=ffffffff85a0cd1c RDX=0000000000000000 RSI=0000000000000001 RDI=0000000000000001 RBP=ffff88806cf09a8d RSP=ffff88806cf09980 R8 =ffffffff85a0cd21 R9 =ffff888016f07cf8 R10=0000000000032042 R11=1ffff1100d9e1338 R12=ffff88806cf09aa0 R13=ffff88806cf09a58 R14=1ffff1100d9e1338 R15=ffffffff85a0cd20 RIP=ffffffff81107594 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fe8680c78c0 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f10056d0d80 CR3=000000000d200000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=000000000000002f002f2e2e2f002e2e XMM01=0000000000000000696c61766e49002f XMM02=ffffffffffffff0f0e0d0c0b0a090807 XMM03=00000000000000006c6175747269762f XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=00005635fa282ae000005635fa288580 XMM06=00005635fa288560ffffffff00000003 XMM07=00000000000000000000000000000000 XMM08=2f63697361622f6372732f2e2e000d0a XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000