0)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) [ 2132.039909] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 16:58:06 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 16:58:06 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 16:58:06 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000000000000) 16:58:06 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc2e2, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140), 0x400000, 0x0) pipe(&(0x7f00000029c0)={0xffffffffffffffff}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000002a00)) mkdirat(0xffffffffffffffff, &(0x7f0000002980)='./file0\x00', 0x23) 16:58:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc2e2, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140), 0x400000, 0x0) pipe(&(0x7f00000029c0)={0xffffffffffffffff}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000002a00)) clock_gettime(0x0, &(0x7f0000002880)) 16:58:06 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 16:58:21 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', 0x0, &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 16:58:21 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 16:58:21 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, 0x0) ftruncate(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x20fc}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="28d0a5865f91e69933a151c11e47a054af5c5c27b5261ab0628bd5934edcbbca4dbd739610bf4d90472e537d236792e3130ca6b4c0a0a4735b54903ad43e4a6ab5d62f222e146828b21c"]) 16:58:21 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc2e2, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140), 0x400000, 0x0) pipe(&(0x7f00000029c0)) clock_gettime(0x0, &(0x7f0000002880)) 16:58:21 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 16:58:21 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc2e2, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140), 0x400000, 0x0) pipe(&(0x7f00000029c0)) mkdirat(0xffffffffffffffff, &(0x7f0000002980)='./file0\x00', 0x23) 16:58:21 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 16:58:21 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8000000000000) 16:58:21 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc2e2, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140), 0x400000, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000002980)='./file0\x00', 0x23) 16:58:21 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 16:58:21 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 16:58:21 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc2e2, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140), 0x400000, 0x0) clock_gettime(0x0, &(0x7f0000002880)) 16:58:21 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc2e2, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000002980)='./file0\x00', 0x23) 16:58:21 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) [ 2147.119104] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 16:58:21 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10000000000000) 16:58:21 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc2e2, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000002980)='./file0\x00', 0x23) 16:58:37 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 16:58:37 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', 0x0, &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 16:58:37 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, 0x0) ftruncate(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x20fc}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="28d0a5865f91e69933a151c11e47a054af5c5c27b5261ab0628bd5934edcbbca4dbd739610bf4d90472e537d236792e3130ca6b4c0a0a4735b54903ad43e4a6ab5d62f222e146828b21c"]) 16:58:37 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 16:58:37 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x20000000000000) 16:58:37 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdirat(0xffffffffffffffff, &(0x7f0000002980)='./file0\x00', 0x23) 16:58:37 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc2e2, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000002880)) 16:58:37 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0), 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 16:58:37 executing program 2: mkdirat(0xffffffffffffffff, &(0x7f0000002980)='./file0\x00', 0x23) 16:58:37 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 16:58:37 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 16:58:37 executing program 2: mkdirat(0xffffffffffffffff, &(0x7f0000002980)='./file0\x00', 0x23) 16:58:37 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0), 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 16:58:37 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc2e2, 0x0) clock_gettime(0x0, &(0x7f0000002880)) [ 2163.577812] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 16:58:37 executing program 2: mkdirat(0xffffffffffffffff, &(0x7f0000002980)='./file0\x00', 0x23) 16:58:37 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clock_gettime(0x0, &(0x7f0000002880)) 16:58:37 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0), 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 16:58:54 executing program 0: clock_gettime(0x0, &(0x7f0000002880)) 16:58:54 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', 0x0, 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 16:58:54 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 16:58:54 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 16:58:54 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000002980)='./file0\x00', 0x23) 16:58:54 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0), 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 16:58:54 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, 0x0) ftruncate(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x20fc}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="28d0a5865f91e69933a151c11e47a054af5c5c27b5261ab0628bd5934edcbbca4dbd739610bf4d90472e537d236792e3130ca6b4c0a0a4735b54903ad43e4a6ab5d62f222e146828b21c"]) 16:58:54 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x40000000000000) 16:58:54 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 16:58:54 executing program 0: clock_gettime(0x0, &(0x7f0000002880)) 16:58:54 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000002980)='./file0\x00', 0x23) 16:58:54 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', 0x0, 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) [ 2180.108288] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 16:59:09 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 16:59:09 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 16:59:09 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, 0x0) ftruncate(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x20fc}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="28d0a5865f91e69933a151c11e47a054af5c5c27b5261ab0628bd5934edcbbca4dbd739610bf4d90472e537d236792e3130ca6b4c0a0a4735b54903ad43e4a6ab5d62f222e146828b21c"]) 16:59:09 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xe0efffff7f0000) 16:59:09 executing program 0: clock_gettime(0x0, &(0x7f0000002880)) 16:59:09 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0), 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 16:59:09 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000002980)='./file0\x00', 0x23) 16:59:09 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', 0x0, 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 16:59:09 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) mkdirat(0xffffffffffffffff, &(0x7f0000002980)='./file0\x00', 0x23) 16:59:09 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 16:59:09 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) mkdirat(0xffffffffffffffff, &(0x7f0000002980)='./file0\x00', 0x23) 16:59:09 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000002880)) [ 2195.424843] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 16:59:09 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 16:59:09 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 16:59:25 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 16:59:25 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 16:59:25 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 16:59:25 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf0ffffff0f0000) 16:59:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000002880)) 16:59:25 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0), 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 16:59:25 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) mkdirat(0xffffffffffffffff, &(0x7f0000002980)='./file0\x00', 0x23) 16:59:25 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, 0x0) ftruncate(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x20fc}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="28d0a5865f91e69933a151c11e47a054af5c5c27b5261ab0628bd5934edcbbca4dbd739610bf4d90472e537d236792e3130ca6b4c0a0a4735b54903ad43e4a6ab5d62f222e146828b21c"]) 16:59:25 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) mkdirat(0xffffffffffffffff, &(0x7f0000002980)='./file0\x00', 0x23) 16:59:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000002880)) 16:59:25 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', 0x0, &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 16:59:25 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) [ 2211.256889] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 16:59:25 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 16:59:25 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) mkdirat(0xffffffffffffffff, &(0x7f0000002980)='./file0\x00', 0x23) 16:59:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000002880)) 16:59:25 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100000000000000) 16:59:42 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000002880)) 16:59:42 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x200000000000000) 16:59:42 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', 0x0, &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 16:59:42 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', 0x0, &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 16:59:42 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) mkdirat(0xffffffffffffffff, &(0x7f0000002980)='./file0\x00', 0x23) 16:59:42 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 16:59:42 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 16:59:42 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, 0x0) ftruncate(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x20fc}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="28d0a5865f91e69933a151c11e47a054af5c5c27b5261ab0628bd5934edcbbca4dbd739610bf4d90472e537d236792e3130ca6b4c0a0a4735b54903ad43e4a6ab5d62f222e146828b21c"]) 16:59:42 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) mkdirat(0xffffffffffffffff, &(0x7f0000002980)='./file0\x00', 0x23) 16:59:42 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000002880)) [ 2227.926934] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 16:59:42 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', 0x0, &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 16:59:42 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 16:59:42 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 16:59:42 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x300000000000000) 16:59:42 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) mkdirat(0xffffffffffffffff, &(0x7f0000002980)='./file0\x00', 0x23) 16:59:42 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) clock_gettime(0x0, &(0x7f0000002880)) 16:59:42 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 16:59:42 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 16:59:57 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) mkdirat(0xffffffffffffffff, &(0x7f0000002980)='./file0\x00', 0x23) 16:59:57 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', 0x0, &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 16:59:57 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x400000000000000) 16:59:57 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 16:59:57 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 16:59:57 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) clock_gettime(0x0, &(0x7f0000002880)) 16:59:57 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, 0x0) ftruncate(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x20fc}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="28d0a5865f91e69933a151c11e47a054af5c5c27b5261ab0628bd5934edcbbca4dbd739610bf4d90472e537d236792e3130ca6b4c0a0a4735b54903ad43e4a6ab5d62f222e146828b21c"]) 16:59:57 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 16:59:57 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) clock_gettime(0x0, &(0x7f0000002880)) 16:59:57 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) mkdirat(0xffffffffffffffff, &(0x7f0000002980)='./file0\x00', 0x23) [ 2243.223795] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 16:59:57 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 16:59:57 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180), 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 16:59:57 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 16:59:57 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) clock_gettime(0x0, &(0x7f0000002880)) [ 2243.306397] audit: type=1326 audit(1687712397.602:58): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=24330 comm="syz-executor.2" exe="/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f2d5c1efb19 code=0x0 16:59:57 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x500000000000000) 16:59:57 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180), 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 16:59:57 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180), 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:00:13 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', 0x0, &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:00:13 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, 0x0, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:00:13 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[0x0, &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:00:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) clock_gettime(0x0, &(0x7f0000002880)) 17:00:13 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x600000000000000) 17:00:13 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:00:13 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, 0x0) ftruncate(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x20fc}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="28d0a5865f91e69933a151c11e47a054af5c5c27b5261ab0628bd5934edcbbca4dbd739610bf4d90472e537d236792e3130ca6b4c0a0a4735b54903ad43e4a6ab5d62f222e146828b21c"]) 17:00:13 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) mkdirat(0xffffffffffffffff, &(0x7f0000002980)='./file0\x00', 0x23) [ 2259.422799] audit: type=1326 audit(1687712413.718:59): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=24477 comm="syz-executor.2" exe="/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f2d5c1efb19 code=0x0 17:00:13 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[0x0, &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:00:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) clock_gettime(0x0, &(0x7f0000002880)) 17:00:13 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, 0x0, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) [ 2259.540826] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 17:00:13 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:00:13 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x700000000000000) 17:00:13 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[0x0, &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:00:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) clock_gettime(0x0, &(0x7f0000002880)) [ 2259.668731] audit: type=1326 audit(1687712413.964:60): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=24604 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe131b8cb19 code=0x0 17:00:29 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) clock_gettime(0x0, &(0x7f0000002880)) 17:00:29 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:00:29 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) mkdirat(0xffffffffffffffff, &(0x7f0000002980)='./file0\x00', 0x23) 17:00:29 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, 0x0, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) [ 2275.488876] audit: type=1326 audit(1687712429.785:61): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=24716 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe131b8cb19 code=0x0 17:00:29 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(0x0, 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) [ 2275.501300] audit: type=1326 audit(1687712429.797:62): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=24718 comm="syz-executor.2" exe="/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f2d5c1efb19 code=0x0 17:00:29 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, 0x0) ftruncate(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x20fc}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="28d0a5865f91e69933a151c11e47a054af5c5c27b5261ab0628bd5934edcbbca4dbd739610bf4d90472e537d236792e3130ca6b4c0a0a4735b54903ad43e4a6ab5d62f222e146828b21c"]) 17:00:29 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xc00000000000000) 17:00:29 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:00:29 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, 0x0, 0x0) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:00:29 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(0x0, 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) [ 2275.653161] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 17:00:29 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180), 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:00:30 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000000000000000) 17:00:30 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, 0x0, 0x0) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:00:30 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(0x0, 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:00:30 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180), 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:00:45 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, 0x0, 0x0) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:00:45 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0x0, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:00:45 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) [ 2291.549912] audit: type=1326 audit(1687712445.846:63): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=24974 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe131b8cb19 code=0x0 17:00:45 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdirat(0xffffffffffffffff, 0x0, 0x23) 17:00:45 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, 0x0) ftruncate(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x20fc}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="28d0a5865f91e69933a151c11e47a054af5c5c27b5261ab0628bd5934edcbbca4dbd739610bf4d90472e537d236792e3130ca6b4c0a0a4735b54903ad43e4a6ab5d62f222e146828b21c"]) 17:00:45 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1200000000000000) 17:00:45 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) clock_gettime(0x0, &(0x7f0000002880)) 17:00:45 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180), 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:00:45 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:00:45 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0x0, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) [ 2291.650544] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 17:00:45 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mkdirat(0xffffffffffffffff, 0x0, 0x0) 17:00:45 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:00:46 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:00:46 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1800000000000000) 17:00:46 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0x0, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:00:46 executing program 2: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, 0x0, 0x0) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:00:46 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:00:46 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:00:59 executing program 2: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x700000000000000) 17:00:59 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:00:59 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clock_gettime(0x0, 0x0) 17:00:59 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(0x0, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:00:59 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x0) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:00:59 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:00:59 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, 0x0) ftruncate(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x20fc}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="28d0a5865f91e69933a151c11e47a054af5c5c27b5261ab0628bd5934edcbbca4dbd739610bf4d90472e537d236792e3130ca6b4c0a0a4735b54903ad43e4a6ab5d62f222e146828b21c"]) 17:00:59 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1b03000000000000) 17:00:59 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', 0x0, &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:00:59 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clock_gettime(0x0, 0x0) 17:00:59 executing program 2: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180), 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) [ 2305.311829] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 17:00:59 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x0) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:00:59 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(0x0, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:00:59 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', 0x0, &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:00:59 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clock_gettime(0x0, 0x0) 17:00:59 executing program 2: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:01:13 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, 0x0) ftruncate(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x20fc}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="28d0a5865f91e69933a151c11e47a054af5c5c27b5261ab0628bd5934edcbbca4dbd739610bf4d90472e537d236792e3130ca6b4c0a0a4735b54903ad43e4a6ab5d62f222e146828b21c"]) 17:01:13 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', 0x0, &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:01:13 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1e00000000000000) 17:01:13 executing program 2: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x20000000000000) 17:01:13 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', 0x0, &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:01:13 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(0x0, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:01:13 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, 0x0, 0x0) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:01:13 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x0) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:01:13 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, 0x0) ftruncate(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x20fc}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="28d0a5865f91e69933a151c11e47a054af5c5c27b5261ab0628bd5934edcbbca4dbd739610bf4d90472e537d236792e3130ca6b4c0a0a4735b54903ad43e4a6ab5d62f222e146828b21c"]) 17:01:13 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, 0x0, &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) [ 2319.631348] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 17:01:13 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:01:13 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, 0x0, 0x0) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:01:14 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) [ 2319.786094] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 17:01:14 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2103000000000000) 17:01:14 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:01:14 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, 0x0, &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:01:28 executing program 0: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:01:28 executing program 2: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, 0x0, 0x0) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:01:28 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:01:28 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:01:28 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, 0x0, &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:01:28 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, 0x0) ftruncate(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x20fc}], 0x0, 0x0) 17:01:28 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2400000000000000) 17:01:28 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, 0x0, 0x0) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:01:28 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:01:28 executing program 2: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, 0x0, 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:01:28 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, 0x0, 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:01:28 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', 0x0, 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:01:28 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2a00000000000000) 17:01:28 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0xca1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000200)="f88d1472f1503a2762dc227e56f34e4dae53a5d2a2382bcc8887be80617a1dd6016849812efcf182747f82f6bcf496be352810be1f5b38611f56d76338150d05726e7545da998c284c93d70fa7d520ccf09768a7796688590af6bc6b27b76109b03f0d12e13652a02d7544640ebb47b9e8b5e4f5001907f4787ba3e81025952b406401c05c6881246fc91fa2ae95bc1478429f073288fe94c634c6404a90c6c5dd27ccb2930aac8dec64a5472329d22474e5dee9db57f086a8ed81daafed2e837d18d0b388db61847820d25ea5428c2fce54a471188dc128fbf24703543cf69b07993dfc7ca74179f8042e6c89", 0xed, 0x5}], 0xc00, &(0x7f0000000400)={[{@sbsector={'sbsector', 0x3d, 0xff}}], [{@smackfsroot={'smackfsroot', 0x3d, 'io\x00'}}, {@audit}, {@uid_lt={'uid<', r2}}]}) r3 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0xff, 0x7, 0x80, 0x90, 0x0, 0x3, 0x20, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x40, 0x4, 0x5, 0x0, 0x100000000, 0x0, 0x3, 0x0, 0x80000000, 0x0, 0x84}, 0x0, 0x10, r1, 0x2) r4 = syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x1, 0x6, &(0x7f0000000a00)=[{&(0x7f0000000500)="5becdd33b7232cdabe5be761274be5c64b950645bbf9b2c20eef2c5a52c7bb2f42a95da9c3ae184b81a8534b738172c5e2e53967ee517b0c0083c4aec3023fea14c60d80d56e4d4dbe041da290e95056088cdf9a7d09db5b77158ae155aa3d1ecc423922a08ecb143f5556e7e33e6e5167a98035ee51b8a204ad58055fadac62fc63a02e15428260f5e18044cd257bda23", 0x91, 0xfffffffffffffffc}, {&(0x7f0000000680)="c480fa96016998c6e5232e472ce0ff2e5b3f8627888579cd6750adb1021d318d91e46d8cf242e0b79dbe56d160198954961e2b96d2429eaec3bc002cfdb8d8eb1319eb5c7df50ce03b75e14a94813c800f54fb94e6f20f7f2a7e1ed17f1851f54f687e610db52164bb7e82ec1585c1f0bf30379c6200f4de9f817e63281692d64620367af10017e56f660c09e0f74dfea7fde2762479f3be", 0x98, 0x9}, {&(0x7f0000000740)="3cd1e27bae50a3f11bd633871541f74eae39af90364bc1c04b8ee3e4823db7cf7cbaf5a017106c4712fc229dcfa619997ad24eec01ac82a156e14f3e950e0410efd9e27f3476157df83cc94c2585b95f1b6a36b20f56691889b3c4a9df555095412c342172436ae0e8debccaea3d92e7dcb1cc757211a551a8ec7b4e6fab2da15c96dc63f6f0a727276324", 0x8b, 0x2}, {&(0x7f00000005c0)="8f7834c0b9832b47648433f82dcc1d5e42ac17fa788a", 0x16, 0x4}, {&(0x7f0000000800)="a1b442049f9449ffd0bcce6af95e636535c45c70d873b4b950b4c1b6aeec25248a69821190795355b876a1b119898653823e9701aa2fa0916d7d4dc3a4f952454028c0c10451020a72bb52ff054efe50e6a6b7d7c2344d8d149ee25327834d5cbd636cd27d501c14a56d2a8386010d5d6a194a8411025fdc1cac29c19a08ae17762a631c1cecfcd6b7dc1941dd9682682888a62da1b3bcdbc54ab48b12edad5a85b943255600a73bf86332a3b89ea191bae2e018f9b54f407ede973499182da30e995fcec40ac29a726dc8783ad3c5980afd6793211faf307194e1", 0xdb, 0x6}, {&(0x7f0000000900)="b37ebfa264410ed0a89812b6de96a5d2bc1bef26e022b5e6cb767ac6b65922ad9ea310d293d49b00d3da1e9066ee7466343c9aa1fde1c5b5dffcb1253f62939004e39860f82e87b8046f68b00a57b21c4ef09d83bc340c5634f8837aa310a7185dc3977c723e3f30394ef0a1b22b305442ac1d81460eebae30334a9ad03ad1f6fab26ba9275c0d3f1d0025a69c9f510dccea338b053e7860ebac709c86ce4d294a8120730354babc2ea725c31e41eebd4b99960dec13bc2743264bbe8ecf67cf8689a4c52daf997e9aff2d63b13897579bbed3a6a49857cf96b9b9f995ef40f392704f44760f8c0cc17bb7d7cffc1fc98effe6d47709ad", 0xf7, 0x6f}], 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt={'fowner>', r2}}]}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000600)={r4, 0x8, 0x10000, 0x1000}) readv(r5, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 17:01:28 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:01:28 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:01:28 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) [ 2334.708817] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 17:01:44 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3000000000000000) 17:01:44 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', 0x0, 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:01:44 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', 0x0, &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:01:44 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, 0x0) ftruncate(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x20fc}], 0x0, 0x0) 17:01:44 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, 0x0, 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:01:44 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0xca1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000200)="f88d1472f1503a2762dc227e56f34e4dae53a5d2a2382bcc8887be80617a1dd6016849812efcf182747f82f6bcf496be352810be1f5b38611f56d76338150d05726e7545da998c284c93d70fa7d520ccf09768a7796688590af6bc6b27b76109b03f0d12e13652a02d7544640ebb47b9e8b5e4f5001907f4787ba3e81025952b406401c05c6881246fc91fa2ae95bc1478429f073288fe94c634c6404a90c6c5dd27ccb2930aac8dec64a5472329d22474e5dee9db57f086a8ed81daafed2e837d18d0b388db61847820d25ea5428c2fce54a471188dc128fbf24703543cf69b07993dfc7ca74179f8042e6c89", 0xed, 0x5}], 0xc00, &(0x7f0000000400)={[{@sbsector={'sbsector', 0x3d, 0xff}}], [{@smackfsroot={'smackfsroot', 0x3d, 'io\x00'}}, {@audit}, {@uid_lt={'uid<', r2}}]}) r3 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0xff, 0x7, 0x80, 0x90, 0x0, 0x3, 0x20, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x40, 0x4, 0x5, 0x0, 0x100000000, 0x0, 0x3, 0x0, 0x80000000, 0x0, 0x84}, 0x0, 0x10, r1, 0x2) r4 = syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x1, 0x6, &(0x7f0000000a00)=[{&(0x7f0000000500)="5becdd33b7232cdabe5be761274be5c64b950645bbf9b2c20eef2c5a52c7bb2f42a95da9c3ae184b81a8534b738172c5e2e53967ee517b0c0083c4aec3023fea14c60d80d56e4d4dbe041da290e95056088cdf9a7d09db5b77158ae155aa3d1ecc423922a08ecb143f5556e7e33e6e5167a98035ee51b8a204ad58055fadac62fc63a02e15428260f5e18044cd257bda23", 0x91, 0xfffffffffffffffc}, {&(0x7f0000000680)="c480fa96016998c6e5232e472ce0ff2e5b3f8627888579cd6750adb1021d318d91e46d8cf242e0b79dbe56d160198954961e2b96d2429eaec3bc002cfdb8d8eb1319eb5c7df50ce03b75e14a94813c800f54fb94e6f20f7f2a7e1ed17f1851f54f687e610db52164bb7e82ec1585c1f0bf30379c6200f4de9f817e63281692d64620367af10017e56f660c09e0f74dfea7fde2762479f3be", 0x98, 0x9}, {&(0x7f0000000740)="3cd1e27bae50a3f11bd633871541f74eae39af90364bc1c04b8ee3e4823db7cf7cbaf5a017106c4712fc229dcfa619997ad24eec01ac82a156e14f3e950e0410efd9e27f3476157df83cc94c2585b95f1b6a36b20f56691889b3c4a9df555095412c342172436ae0e8debccaea3d92e7dcb1cc757211a551a8ec7b4e6fab2da15c96dc63f6f0a727276324", 0x8b, 0x2}, {&(0x7f00000005c0)="8f7834c0b9832b47648433f82dcc1d5e42ac17fa788a", 0x16, 0x4}, {&(0x7f0000000800)="a1b442049f9449ffd0bcce6af95e636535c45c70d873b4b950b4c1b6aeec25248a69821190795355b876a1b119898653823e9701aa2fa0916d7d4dc3a4f952454028c0c10451020a72bb52ff054efe50e6a6b7d7c2344d8d149ee25327834d5cbd636cd27d501c14a56d2a8386010d5d6a194a8411025fdc1cac29c19a08ae17762a631c1cecfcd6b7dc1941dd9682682888a62da1b3bcdbc54ab48b12edad5a85b943255600a73bf86332a3b89ea191bae2e018f9b54f407ede973499182da30e995fcec40ac29a726dc8783ad3c5980afd6793211faf307194e1", 0xdb, 0x6}, {&(0x7f0000000900)="b37ebfa264410ed0a89812b6de96a5d2bc1bef26e022b5e6cb767ac6b65922ad9ea310d293d49b00d3da1e9066ee7466343c9aa1fde1c5b5dffcb1253f62939004e39860f82e87b8046f68b00a57b21c4ef09d83bc340c5634f8837aa310a7185dc3977c723e3f30394ef0a1b22b305442ac1d81460eebae30334a9ad03ad1f6fab26ba9275c0d3f1d0025a69c9f510dccea338b053e7860ebac709c86ce4d294a8120730354babc2ea725c31e41eebd4b99960dec13bc2743264bbe8ecf67cf8689a4c52daf997e9aff2d63b13897579bbed3a6a49857cf96b9b9f995ef40f392704f44760f8c0cc17bb7d7cffc1fc98effe6d47709ad", 0xf7, 0x6f}], 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt={'fowner>', r2}}]}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000600)={r4, 0x8, 0x10000, 0x1000}) readv(r5, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 17:01:44 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0xca1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000200)="f88d1472f1503a2762dc227e56f34e4dae53a5d2a2382bcc8887be80617a1dd6016849812efcf182747f82f6bcf496be352810be1f5b38611f56d76338150d05726e7545da998c284c93d70fa7d520ccf09768a7796688590af6bc6b27b76109b03f0d12e13652a02d7544640ebb47b9e8b5e4f5001907f4787ba3e81025952b406401c05c6881246fc91fa2ae95bc1478429f073288fe94c634c6404a90c6c5dd27ccb2930aac8dec64a5472329d22474e5dee9db57f086a8ed81daafed2e837d18d0b388db61847820d25ea5428c2fce54a471188dc128fbf24703543cf69b07993dfc7ca74179f8042e6c89", 0xed, 0x5}], 0xc00, &(0x7f0000000400)={[{@sbsector={'sbsector', 0x3d, 0xff}}], [{@smackfsroot={'smackfsroot', 0x3d, 'io\x00'}}, {@audit}, {@uid_lt={'uid<', r2}}]}) r3 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0xff, 0x7, 0x80, 0x90, 0x0, 0x3, 0x20, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x40, 0x4, 0x5, 0x0, 0x100000000, 0x0, 0x3, 0x0, 0x80000000, 0x0, 0x84}, 0x0, 0x10, r1, 0x2) r4 = syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x1, 0x6, &(0x7f0000000a00)=[{&(0x7f0000000500)="5becdd33b7232cdabe5be761274be5c64b950645bbf9b2c20eef2c5a52c7bb2f42a95da9c3ae184b81a8534b738172c5e2e53967ee517b0c0083c4aec3023fea14c60d80d56e4d4dbe041da290e95056088cdf9a7d09db5b77158ae155aa3d1ecc423922a08ecb143f5556e7e33e6e5167a98035ee51b8a204ad58055fadac62fc63a02e15428260f5e18044cd257bda23", 0x91, 0xfffffffffffffffc}, {&(0x7f0000000680)="c480fa96016998c6e5232e472ce0ff2e5b3f8627888579cd6750adb1021d318d91e46d8cf242e0b79dbe56d160198954961e2b96d2429eaec3bc002cfdb8d8eb1319eb5c7df50ce03b75e14a94813c800f54fb94e6f20f7f2a7e1ed17f1851f54f687e610db52164bb7e82ec1585c1f0bf30379c6200f4de9f817e63281692d64620367af10017e56f660c09e0f74dfea7fde2762479f3be", 0x98, 0x9}, {&(0x7f0000000740)="3cd1e27bae50a3f11bd633871541f74eae39af90364bc1c04b8ee3e4823db7cf7cbaf5a017106c4712fc229dcfa619997ad24eec01ac82a156e14f3e950e0410efd9e27f3476157df83cc94c2585b95f1b6a36b20f56691889b3c4a9df555095412c342172436ae0e8debccaea3d92e7dcb1cc757211a551a8ec7b4e6fab2da15c96dc63f6f0a727276324", 0x8b, 0x2}, {&(0x7f00000005c0)="8f7834c0b9832b47648433f82dcc1d5e42ac17fa788a", 0x16, 0x4}, {&(0x7f0000000800)="a1b442049f9449ffd0bcce6af95e636535c45c70d873b4b950b4c1b6aeec25248a69821190795355b876a1b119898653823e9701aa2fa0916d7d4dc3a4f952454028c0c10451020a72bb52ff054efe50e6a6b7d7c2344d8d149ee25327834d5cbd636cd27d501c14a56d2a8386010d5d6a194a8411025fdc1cac29c19a08ae17762a631c1cecfcd6b7dc1941dd9682682888a62da1b3bcdbc54ab48b12edad5a85b943255600a73bf86332a3b89ea191bae2e018f9b54f407ede973499182da30e995fcec40ac29a726dc8783ad3c5980afd6793211faf307194e1", 0xdb, 0x6}, {&(0x7f0000000900)="b37ebfa264410ed0a89812b6de96a5d2bc1bef26e022b5e6cb767ac6b65922ad9ea310d293d49b00d3da1e9066ee7466343c9aa1fde1c5b5dffcb1253f62939004e39860f82e87b8046f68b00a57b21c4ef09d83bc340c5634f8837aa310a7185dc3977c723e3f30394ef0a1b22b305442ac1d81460eebae30334a9ad03ad1f6fab26ba9275c0d3f1d0025a69c9f510dccea338b053e7860ebac709c86ce4d294a8120730354babc2ea725c31e41eebd4b99960dec13bc2743264bbe8ecf67cf8689a4c52daf997e9aff2d63b13897579bbed3a6a49857cf96b9b9f995ef40f392704f44760f8c0cc17bb7d7cffc1fc98effe6d47709ad", 0xf7, 0x6f}], 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt={'fowner>', r2}}]}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000600)={r4, 0x8, 0x10000, 0x1000}) readv(r5, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 17:01:44 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) [ 2350.748533] FAT-fs (loop0): Unrecognized mount option "fowner>00000000000000000000" or missing value [ 2350.787914] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 17:01:45 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', 0x0, 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:01:45 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, 0x0, 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:01:45 executing program 0: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:01:45 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0xca1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000200)="f88d1472f1503a2762dc227e56f34e4dae53a5d2a2382bcc8887be80617a1dd6016849812efcf182747f82f6bcf496be352810be1f5b38611f56d76338150d05726e7545da998c284c93d70fa7d520ccf09768a7796688590af6bc6b27b76109b03f0d12e13652a02d7544640ebb47b9e8b5e4f5001907f4787ba3e81025952b406401c05c6881246fc91fa2ae95bc1478429f073288fe94c634c6404a90c6c5dd27ccb2930aac8dec64a5472329d22474e5dee9db57f086a8ed81daafed2e837d18d0b388db61847820d25ea5428c2fce54a471188dc128fbf24703543cf69b07993dfc7ca74179f8042e6c89", 0xed, 0x5}], 0xc00, &(0x7f0000000400)={[{@sbsector={'sbsector', 0x3d, 0xff}}], [{@smackfsroot={'smackfsroot', 0x3d, 'io\x00'}}, {@audit}, {@uid_lt={'uid<', r2}}]}) r3 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0xff, 0x7, 0x80, 0x90, 0x0, 0x3, 0x20, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x40, 0x4, 0x5, 0x0, 0x100000000, 0x0, 0x3, 0x0, 0x80000000, 0x0, 0x84}, 0x0, 0x10, r1, 0x2) r4 = syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x1, 0x6, &(0x7f0000000a00)=[{&(0x7f0000000500)="5becdd33b7232cdabe5be761274be5c64b950645bbf9b2c20eef2c5a52c7bb2f42a95da9c3ae184b81a8534b738172c5e2e53967ee517b0c0083c4aec3023fea14c60d80d56e4d4dbe041da290e95056088cdf9a7d09db5b77158ae155aa3d1ecc423922a08ecb143f5556e7e33e6e5167a98035ee51b8a204ad58055fadac62fc63a02e15428260f5e18044cd257bda23", 0x91, 0xfffffffffffffffc}, {&(0x7f0000000680)="c480fa96016998c6e5232e472ce0ff2e5b3f8627888579cd6750adb1021d318d91e46d8cf242e0b79dbe56d160198954961e2b96d2429eaec3bc002cfdb8d8eb1319eb5c7df50ce03b75e14a94813c800f54fb94e6f20f7f2a7e1ed17f1851f54f687e610db52164bb7e82ec1585c1f0bf30379c6200f4de9f817e63281692d64620367af10017e56f660c09e0f74dfea7fde2762479f3be", 0x98, 0x9}, {&(0x7f0000000740)="3cd1e27bae50a3f11bd633871541f74eae39af90364bc1c04b8ee3e4823db7cf7cbaf5a017106c4712fc229dcfa619997ad24eec01ac82a156e14f3e950e0410efd9e27f3476157df83cc94c2585b95f1b6a36b20f56691889b3c4a9df555095412c342172436ae0e8debccaea3d92e7dcb1cc757211a551a8ec7b4e6fab2da15c96dc63f6f0a727276324", 0x8b, 0x2}, {&(0x7f00000005c0)="8f7834c0b9832b47648433f82dcc1d5e42ac17fa788a", 0x16, 0x4}, {&(0x7f0000000800)="a1b442049f9449ffd0bcce6af95e636535c45c70d873b4b950b4c1b6aeec25248a69821190795355b876a1b119898653823e9701aa2fa0916d7d4dc3a4f952454028c0c10451020a72bb52ff054efe50e6a6b7d7c2344d8d149ee25327834d5cbd636cd27d501c14a56d2a8386010d5d6a194a8411025fdc1cac29c19a08ae17762a631c1cecfcd6b7dc1941dd9682682888a62da1b3bcdbc54ab48b12edad5a85b943255600a73bf86332a3b89ea191bae2e018f9b54f407ede973499182da30e995fcec40ac29a726dc8783ad3c5980afd6793211faf307194e1", 0xdb, 0x6}, {&(0x7f0000000900)="b37ebfa264410ed0a89812b6de96a5d2bc1bef26e022b5e6cb767ac6b65922ad9ea310d293d49b00d3da1e9066ee7466343c9aa1fde1c5b5dffcb1253f62939004e39860f82e87b8046f68b00a57b21c4ef09d83bc340c5634f8837aa310a7185dc3977c723e3f30394ef0a1b22b305442ac1d81460eebae30334a9ad03ad1f6fab26ba9275c0d3f1d0025a69c9f510dccea338b053e7860ebac709c86ce4d294a8120730354babc2ea725c31e41eebd4b99960dec13bc2743264bbe8ecf67cf8689a4c52daf997e9aff2d63b13897579bbed3a6a49857cf96b9b9f995ef40f392704f44760f8c0cc17bb7d7cffc1fc98effe6d47709ad", 0xf7, 0x6f}], 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt={'fowner>', r2}}]}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000600)={r4, 0x8, 0x10000, 0x1000}) readv(r5, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 17:01:45 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(0x0, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) [ 2350.997937] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 17:01:45 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', 0x0, &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:01:45 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0xca1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000200)="f88d1472f1503a2762dc227e56f34e4dae53a5d2a2382bcc8887be80617a1dd6016849812efcf182747f82f6bcf496be352810be1f5b38611f56d76338150d05726e7545da998c284c93d70fa7d520ccf09768a7796688590af6bc6b27b76109b03f0d12e13652a02d7544640ebb47b9e8b5e4f5001907f4787ba3e81025952b406401c05c6881246fc91fa2ae95bc1478429f073288fe94c634c6404a90c6c5dd27ccb2930aac8dec64a5472329d22474e5dee9db57f086a8ed81daafed2e837d18d0b388db61847820d25ea5428c2fce54a471188dc128fbf24703543cf69b07993dfc7ca74179f8042e6c89", 0xed, 0x5}], 0xc00, &(0x7f0000000400)={[{@sbsector={'sbsector', 0x3d, 0xff}}], [{@smackfsroot={'smackfsroot', 0x3d, 'io\x00'}}, {@audit}, {@uid_lt={'uid<', r2}}]}) r3 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0xff, 0x7, 0x80, 0x90, 0x0, 0x3, 0x20, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x40, 0x4, 0x5, 0x0, 0x100000000, 0x0, 0x3, 0x0, 0x80000000, 0x0, 0x84}, 0x0, 0x10, r1, 0x2) r4 = syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x1, 0x6, &(0x7f0000000a00)=[{&(0x7f0000000500)="5becdd33b7232cdabe5be761274be5c64b950645bbf9b2c20eef2c5a52c7bb2f42a95da9c3ae184b81a8534b738172c5e2e53967ee517b0c0083c4aec3023fea14c60d80d56e4d4dbe041da290e95056088cdf9a7d09db5b77158ae155aa3d1ecc423922a08ecb143f5556e7e33e6e5167a98035ee51b8a204ad58055fadac62fc63a02e15428260f5e18044cd257bda23", 0x91, 0xfffffffffffffffc}, {&(0x7f0000000680)="c480fa96016998c6e5232e472ce0ff2e5b3f8627888579cd6750adb1021d318d91e46d8cf242e0b79dbe56d160198954961e2b96d2429eaec3bc002cfdb8d8eb1319eb5c7df50ce03b75e14a94813c800f54fb94e6f20f7f2a7e1ed17f1851f54f687e610db52164bb7e82ec1585c1f0bf30379c6200f4de9f817e63281692d64620367af10017e56f660c09e0f74dfea7fde2762479f3be", 0x98, 0x9}, {&(0x7f0000000740)="3cd1e27bae50a3f11bd633871541f74eae39af90364bc1c04b8ee3e4823db7cf7cbaf5a017106c4712fc229dcfa619997ad24eec01ac82a156e14f3e950e0410efd9e27f3476157df83cc94c2585b95f1b6a36b20f56691889b3c4a9df555095412c342172436ae0e8debccaea3d92e7dcb1cc757211a551a8ec7b4e6fab2da15c96dc63f6f0a727276324", 0x8b, 0x2}, {&(0x7f00000005c0)="8f7834c0b9832b47648433f82dcc1d5e42ac17fa788a", 0x16, 0x4}, {&(0x7f0000000800)="a1b442049f9449ffd0bcce6af95e636535c45c70d873b4b950b4c1b6aeec25248a69821190795355b876a1b119898653823e9701aa2fa0916d7d4dc3a4f952454028c0c10451020a72bb52ff054efe50e6a6b7d7c2344d8d149ee25327834d5cbd636cd27d501c14a56d2a8386010d5d6a194a8411025fdc1cac29c19a08ae17762a631c1cecfcd6b7dc1941dd9682682888a62da1b3bcdbc54ab48b12edad5a85b943255600a73bf86332a3b89ea191bae2e018f9b54f407ede973499182da30e995fcec40ac29a726dc8783ad3c5980afd6793211faf307194e1", 0xdb, 0x6}, {&(0x7f0000000900)="b37ebfa264410ed0a89812b6de96a5d2bc1bef26e022b5e6cb767ac6b65922ad9ea310d293d49b00d3da1e9066ee7466343c9aa1fde1c5b5dffcb1253f62939004e39860f82e87b8046f68b00a57b21c4ef09d83bc340c5634f8837aa310a7185dc3977c723e3f30394ef0a1b22b305442ac1d81460eebae30334a9ad03ad1f6fab26ba9275c0d3f1d0025a69c9f510dccea338b053e7860ebac709c86ce4d294a8120730354babc2ea725c31e41eebd4b99960dec13bc2743264bbe8ecf67cf8689a4c52daf997e9aff2d63b13897579bbed3a6a49857cf96b9b9f995ef40f392704f44760f8c0cc17bb7d7cffc1fc98effe6d47709ad", 0xf7, 0x6f}], 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt={'fowner>', r2}}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000600)={r4, 0x8, 0x10000, 0x1000}) [ 2351.126386] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 17:02:02 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', 0x0, &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:02:02 executing program 0: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:02:02 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0xca1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000200)="f88d1472f1503a2762dc227e56f34e4dae53a5d2a2382bcc8887be80617a1dd6016849812efcf182747f82f6bcf496be352810be1f5b38611f56d76338150d05726e7545da998c284c93d70fa7d520ccf09768a7796688590af6bc6b27b76109b03f0d12e13652a02d7544640ebb47b9e8b5e4f5001907f4787ba3e81025952b406401c05c6881246fc91fa2ae95bc1478429f073288fe94c634c6404a90c6c5dd27ccb2930aac8dec64a5472329d22474e5dee9db57f086a8ed81daafed2e837d18d0b388db61847820d25ea5428c2fce54a471188dc128fbf24703543cf69b07993dfc7ca74179f8042e6c89", 0xed, 0x5}], 0xc00, &(0x7f0000000400)={[{@sbsector={'sbsector', 0x3d, 0xff}}], [{@smackfsroot={'smackfsroot', 0x3d, 'io\x00'}}, {@audit}, {@uid_lt={'uid<', r2}}]}) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0xff, 0x7, 0x80, 0x90, 0x0, 0x3, 0x20, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x40, 0x4, 0x5, 0x0, 0x100000000, 0x0, 0x3, 0x0, 0x80000000, 0x0, 0x84}, 0x0, 0x10, r1, 0x2) syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x1, 0x6, &(0x7f0000000a00)=[{&(0x7f0000000500)="5becdd33b7232cdabe5be761274be5c64b950645bbf9b2c20eef2c5a52c7bb2f42a95da9c3ae184b81a8534b738172c5e2e53967ee517b0c0083c4aec3023fea14c60d80d56e4d4dbe041da290e95056088cdf9a7d09db5b77158ae155aa3d1ecc423922a08ecb143f5556e7e33e6e5167a98035ee51b8a204ad58055fadac62fc63a02e15428260f5e18044cd257bda23", 0x91, 0xfffffffffffffffc}, {&(0x7f0000000680)="c480fa96016998c6e5232e472ce0ff2e5b3f8627888579cd6750adb1021d318d91e46d8cf242e0b79dbe56d160198954961e2b96d2429eaec3bc002cfdb8d8eb1319eb5c7df50ce03b75e14a94813c800f54fb94e6f20f7f2a7e1ed17f1851f54f687e610db52164bb7e82ec1585c1f0bf30379c6200f4de9f817e63281692d64620367af10017e56f660c09e0f74dfea7fde2762479f3be", 0x98, 0x9}, {&(0x7f0000000740)="3cd1e27bae50a3f11bd633871541f74eae39af90364bc1c04b8ee3e4823db7cf7cbaf5a017106c4712fc229dcfa619997ad24eec01ac82a156e14f3e950e0410efd9e27f3476157df83cc94c2585b95f1b6a36b20f56691889b3c4a9df555095412c342172436ae0e8debccaea3d92e7dcb1cc757211a551a8ec7b4e6fab2da15c96dc63f6f0a727276324", 0x8b, 0x2}, {&(0x7f00000005c0)="8f7834c0b9832b47648433f82dcc1d5e42ac17fa788a", 0x16, 0x4}, {&(0x7f0000000800)="a1b442049f9449ffd0bcce6af95e636535c45c70d873b4b950b4c1b6aeec25248a69821190795355b876a1b119898653823e9701aa2fa0916d7d4dc3a4f952454028c0c10451020a72bb52ff054efe50e6a6b7d7c2344d8d149ee25327834d5cbd636cd27d501c14a56d2a8386010d5d6a194a8411025fdc1cac29c19a08ae17762a631c1cecfcd6b7dc1941dd9682682888a62da1b3bcdbc54ab48b12edad5a85b943255600a73bf86332a3b89ea191bae2e018f9b54f407ede973499182da30e995fcec40ac29a726dc8783ad3c5980afd6793211faf307194e1", 0xdb, 0x6}, {&(0x7f0000000900)="b37ebfa264410ed0a89812b6de96a5d2bc1bef26e022b5e6cb767ac6b65922ad9ea310d293d49b00d3da1e9066ee7466343c9aa1fde1c5b5dffcb1253f62939004e39860f82e87b8046f68b00a57b21c4ef09d83bc340c5634f8837aa310a7185dc3977c723e3f30394ef0a1b22b305442ac1d81460eebae30334a9ad03ad1f6fab26ba9275c0d3f1d0025a69c9f510dccea338b053e7860ebac709c86ce4d294a8120730354babc2ea725c31e41eebd4b99960dec13bc2743264bbe8ecf67cf8689a4c52daf997e9aff2d63b13897579bbed3a6a49857cf96b9b9f995ef40f392704f44760f8c0cc17bb7d7cffc1fc98effe6d47709ad", 0xf7, 0x6f}], 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt={'fowner>', r2}}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:02:02 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3600000000000000) 17:02:02 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, 0x0) ftruncate(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x20fc}], 0x0, 0x0) 17:02:02 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:02:02 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(0x0, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:02:02 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:02:02 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) [ 2368.590505] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 17:02:02 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:02:02 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(0x0, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:02:03 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0xca1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000200)="f88d1472f1503a2762dc227e56f34e4dae53a5d2a2382bcc8887be80617a1dd6016849812efcf182747f82f6bcf496be352810be1f5b38611f56d76338150d05726e7545da998c284c93d70fa7d520ccf09768a7796688590af6bc6b27b76109b03f0d12e13652a02d7544640ebb47b9e8b5e4f5001907f4787ba3e81025952b406401c05c6881246fc91fa2ae95bc1478429f073288fe94c634c6404a90c6c5dd27ccb2930aac8dec64a5472329d22474e5dee9db57f086a8ed81daafed2e837d18d0b388db61847820d25ea5428c2fce54a471188dc128fbf24703543cf69b07993dfc7ca74179f8042e6c89", 0xed, 0x5}], 0xc00, &(0x7f0000000400)={[{@sbsector={'sbsector', 0x3d, 0xff}}], [{@smackfsroot={'smackfsroot', 0x3d, 'io\x00'}}, {@audit}, {@uid_lt={'uid<', r2}}]}) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0xff, 0x7, 0x80, 0x90, 0x0, 0x3, 0x20, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x40, 0x4, 0x5, 0x0, 0x100000000, 0x0, 0x3, 0x0, 0x80000000, 0x0, 0x84}, 0x0, 0x10, r1, 0x2) syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x1, 0x6, &(0x7f0000000a00)=[{&(0x7f0000000500)="5becdd33b7232cdabe5be761274be5c64b950645bbf9b2c20eef2c5a52c7bb2f42a95da9c3ae184b81a8534b738172c5e2e53967ee517b0c0083c4aec3023fea14c60d80d56e4d4dbe041da290e95056088cdf9a7d09db5b77158ae155aa3d1ecc423922a08ecb143f5556e7e33e6e5167a98035ee51b8a204ad58055fadac62fc63a02e15428260f5e18044cd257bda23", 0x91, 0xfffffffffffffffc}, {&(0x7f0000000680)="c480fa96016998c6e5232e472ce0ff2e5b3f8627888579cd6750adb1021d318d91e46d8cf242e0b79dbe56d160198954961e2b96d2429eaec3bc002cfdb8d8eb1319eb5c7df50ce03b75e14a94813c800f54fb94e6f20f7f2a7e1ed17f1851f54f687e610db52164bb7e82ec1585c1f0bf30379c6200f4de9f817e63281692d64620367af10017e56f660c09e0f74dfea7fde2762479f3be", 0x98, 0x9}, {&(0x7f0000000740)="3cd1e27bae50a3f11bd633871541f74eae39af90364bc1c04b8ee3e4823db7cf7cbaf5a017106c4712fc229dcfa619997ad24eec01ac82a156e14f3e950e0410efd9e27f3476157df83cc94c2585b95f1b6a36b20f56691889b3c4a9df555095412c342172436ae0e8debccaea3d92e7dcb1cc757211a551a8ec7b4e6fab2da15c96dc63f6f0a727276324", 0x8b, 0x2}, {&(0x7f00000005c0)="8f7834c0b9832b47648433f82dcc1d5e42ac17fa788a", 0x16, 0x4}, {&(0x7f0000000800)="a1b442049f9449ffd0bcce6af95e636535c45c70d873b4b950b4c1b6aeec25248a69821190795355b876a1b119898653823e9701aa2fa0916d7d4dc3a4f952454028c0c10451020a72bb52ff054efe50e6a6b7d7c2344d8d149ee25327834d5cbd636cd27d501c14a56d2a8386010d5d6a194a8411025fdc1cac29c19a08ae17762a631c1cecfcd6b7dc1941dd9682682888a62da1b3bcdbc54ab48b12edad5a85b943255600a73bf86332a3b89ea191bae2e018f9b54f407ede973499182da30e995fcec40ac29a726dc8783ad3c5980afd6793211faf307194e1", 0xdb, 0x6}, {&(0x7f0000000900)="b37ebfa264410ed0a89812b6de96a5d2bc1bef26e022b5e6cb767ac6b65922ad9ea310d293d49b00d3da1e9066ee7466343c9aa1fde1c5b5dffcb1253f62939004e39860f82e87b8046f68b00a57b21c4ef09d83bc340c5634f8837aa310a7185dc3977c723e3f30394ef0a1b22b305442ac1d81460eebae30334a9ad03ad1f6fab26ba9275c0d3f1d0025a69c9f510dccea338b053e7860ebac709c86ce4d294a8120730354babc2ea725c31e41eebd4b99960dec13bc2743264bbe8ecf67cf8689a4c52daf997e9aff2d63b13897579bbed3a6a49857cf96b9b9f995ef40f392704f44760f8c0cc17bb7d7cffc1fc98effe6d47709ad", 0xf7, 0x6f}], 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt={'fowner>', r2}}]}) 17:02:03 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:02:03 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:02:03 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3c00000000000000) 17:02:03 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:02:03 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, 0x0, &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:02:18 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, 0x0) ftruncate(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x20fc}], 0x0, &(0x7f0000000240)=ANY=[]) 17:02:18 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0xca1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000200)="f88d1472f1503a2762dc227e56f34e4dae53a5d2a2382bcc8887be80617a1dd6016849812efcf182747f82f6bcf496be352810be1f5b38611f56d76338150d05726e7545da998c284c93d70fa7d520ccf09768a7796688590af6bc6b27b76109b03f0d12e13652a02d7544640ebb47b9e8b5e4f5001907f4787ba3e81025952b406401c05c6881246fc91fa2ae95bc1478429f073288fe94c634c6404a90c6c5dd27ccb2930aac8dec64a5472329d22474e5dee9db57f086a8ed81daafed2e837d18d0b388db61847820d25ea5428c2fce54a471188dc128fbf24703543cf69b07993dfc7ca74179f8042e6c89", 0xed, 0x5}], 0xc00, &(0x7f0000000400)={[{@sbsector={'sbsector', 0x3d, 0xff}}], [{@smackfsroot={'smackfsroot', 0x3d, 'io\x00'}}, {@audit}, {@uid_lt={'uid<', r2}}]}) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0xff, 0x7, 0x80, 0x90, 0x0, 0x3, 0x20, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x40, 0x4, 0x5, 0x0, 0x100000000, 0x0, 0x3, 0x0, 0x80000000, 0x0, 0x84}, 0x0, 0x10, r1, 0x2) syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x1, 0x6, &(0x7f0000000a00)=[{&(0x7f0000000500)="5becdd33b7232cdabe5be761274be5c64b950645bbf9b2c20eef2c5a52c7bb2f42a95da9c3ae184b81a8534b738172c5e2e53967ee517b0c0083c4aec3023fea14c60d80d56e4d4dbe041da290e95056088cdf9a7d09db5b77158ae155aa3d1ecc423922a08ecb143f5556e7e33e6e5167a98035ee51b8a204ad58055fadac62fc63a02e15428260f5e18044cd257bda23", 0x91, 0xfffffffffffffffc}, {&(0x7f0000000680)="c480fa96016998c6e5232e472ce0ff2e5b3f8627888579cd6750adb1021d318d91e46d8cf242e0b79dbe56d160198954961e2b96d2429eaec3bc002cfdb8d8eb1319eb5c7df50ce03b75e14a94813c800f54fb94e6f20f7f2a7e1ed17f1851f54f687e610db52164bb7e82ec1585c1f0bf30379c6200f4de9f817e63281692d64620367af10017e56f660c09e0f74dfea7fde2762479f3be", 0x98, 0x9}, {&(0x7f0000000740)="3cd1e27bae50a3f11bd633871541f74eae39af90364bc1c04b8ee3e4823db7cf7cbaf5a017106c4712fc229dcfa619997ad24eec01ac82a156e14f3e950e0410efd9e27f3476157df83cc94c2585b95f1b6a36b20f56691889b3c4a9df555095412c342172436ae0e8debccaea3d92e7dcb1cc757211a551a8ec7b4e6fab2da15c96dc63f6f0a727276324", 0x8b, 0x2}, {&(0x7f00000005c0)="8f7834c0b9832b47648433f82dcc1d5e42ac17fa788a", 0x16, 0x4}, {&(0x7f0000000800)="a1b442049f9449ffd0bcce6af95e636535c45c70d873b4b950b4c1b6aeec25248a69821190795355b876a1b119898653823e9701aa2fa0916d7d4dc3a4f952454028c0c10451020a72bb52ff054efe50e6a6b7d7c2344d8d149ee25327834d5cbd636cd27d501c14a56d2a8386010d5d6a194a8411025fdc1cac29c19a08ae17762a631c1cecfcd6b7dc1941dd9682682888a62da1b3bcdbc54ab48b12edad5a85b943255600a73bf86332a3b89ea191bae2e018f9b54f407ede973499182da30e995fcec40ac29a726dc8783ad3c5980afd6793211faf307194e1", 0xdb, 0x6}, {&(0x7f0000000900)="b37ebfa264410ed0a89812b6de96a5d2bc1bef26e022b5e6cb767ac6b65922ad9ea310d293d49b00d3da1e9066ee7466343c9aa1fde1c5b5dffcb1253f62939004e39860f82e87b8046f68b00a57b21c4ef09d83bc340c5634f8837aa310a7185dc3977c723e3f30394ef0a1b22b305442ac1d81460eebae30334a9ad03ad1f6fab26ba9275c0d3f1d0025a69c9f510dccea338b053e7860ebac709c86ce4d294a8120730354babc2ea725c31e41eebd4b99960dec13bc2743264bbe8ecf67cf8689a4c52daf997e9aff2d63b13897579bbed3a6a49857cf96b9b9f995ef40f392704f44760f8c0cc17bb7d7cffc1fc98effe6d47709ad", 0xf7, 0x6f}], 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt={'fowner>', r2}}]}) 17:02:18 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:02:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) dup3(r0, r1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240), 0x0) 17:02:18 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:02:18 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:02:18 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, 0x0, &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:02:18 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3f00000000000000) 17:02:18 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, 0x0, &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) [ 2384.380105] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 17:02:18 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, 0x0) ftruncate(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x20fc}], 0x0, &(0x7f0000000240)=ANY=[]) 17:02:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) dup3(r0, r1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240), 0x0) 17:02:18 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0xca1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000200)="f88d1472f1503a2762dc227e56f34e4dae53a5d2a2382bcc8887be80617a1dd6016849812efcf182747f82f6bcf496be352810be1f5b38611f56d76338150d05726e7545da998c284c93d70fa7d520ccf09768a7796688590af6bc6b27b76109b03f0d12e13652a02d7544640ebb47b9e8b5e4f5001907f4787ba3e81025952b406401c05c6881246fc91fa2ae95bc1478429f073288fe94c634c6404a90c6c5dd27ccb2930aac8dec64a5472329d22474e5dee9db57f086a8ed81daafed2e837d18d0b388db61847820d25ea5428c2fce54a471188dc128fbf24703543cf69b07993dfc7ca74179f8042e6c89", 0xed, 0x5}], 0xc00, &(0x7f0000000400)={[{@sbsector={'sbsector', 0x3d, 0xff}}], [{@smackfsroot={'smackfsroot', 0x3d, 'io\x00'}}, {@audit}, {@uid_lt={'uid<', r2}}]}) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0xff, 0x7, 0x80, 0x90, 0x0, 0x3, 0x20, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x40, 0x4, 0x5, 0x0, 0x100000000, 0x0, 0x3, 0x0, 0x80000000, 0x0, 0x84}, 0x0, 0x10, r1, 0x2) syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x1, 0x6, &(0x7f0000000a00)=[{&(0x7f0000000500)="5becdd33b7232cdabe5be761274be5c64b950645bbf9b2c20eef2c5a52c7bb2f42a95da9c3ae184b81a8534b738172c5e2e53967ee517b0c0083c4aec3023fea14c60d80d56e4d4dbe041da290e95056088cdf9a7d09db5b77158ae155aa3d1ecc423922a08ecb143f5556e7e33e6e5167a98035ee51b8a204ad58055fadac62fc63a02e15428260f5e18044cd257bda23", 0x91, 0xfffffffffffffffc}, {&(0x7f0000000680)="c480fa96016998c6e5232e472ce0ff2e5b3f8627888579cd6750adb1021d318d91e46d8cf242e0b79dbe56d160198954961e2b96d2429eaec3bc002cfdb8d8eb1319eb5c7df50ce03b75e14a94813c800f54fb94e6f20f7f2a7e1ed17f1851f54f687e610db52164bb7e82ec1585c1f0bf30379c6200f4de9f817e63281692d64620367af10017e56f660c09e0f74dfea7fde2762479f3be", 0x98, 0x9}, {&(0x7f0000000740)="3cd1e27bae50a3f11bd633871541f74eae39af90364bc1c04b8ee3e4823db7cf7cbaf5a017106c4712fc229dcfa619997ad24eec01ac82a156e14f3e950e0410efd9e27f3476157df83cc94c2585b95f1b6a36b20f56691889b3c4a9df555095412c342172436ae0e8debccaea3d92e7dcb1cc757211a551a8ec7b4e6fab2da15c96dc63f6f0a727276324", 0x8b, 0x2}, {&(0x7f00000005c0)="8f7834c0b9832b47648433f82dcc1d5e42ac17fa788a", 0x16, 0x4}, {&(0x7f0000000800)="a1b442049f9449ffd0bcce6af95e636535c45c70d873b4b950b4c1b6aeec25248a69821190795355b876a1b119898653823e9701aa2fa0916d7d4dc3a4f952454028c0c10451020a72bb52ff054efe50e6a6b7d7c2344d8d149ee25327834d5cbd636cd27d501c14a56d2a8386010d5d6a194a8411025fdc1cac29c19a08ae17762a631c1cecfcd6b7dc1941dd9682682888a62da1b3bcdbc54ab48b12edad5a85b943255600a73bf86332a3b89ea191bae2e018f9b54f407ede973499182da30e995fcec40ac29a726dc8783ad3c5980afd6793211faf307194e1", 0xdb, 0x6}, {&(0x7f0000000900)="b37ebfa264410ed0a89812b6de96a5d2bc1bef26e022b5e6cb767ac6b65922ad9ea310d293d49b00d3da1e9066ee7466343c9aa1fde1c5b5dffcb1253f62939004e39860f82e87b8046f68b00a57b21c4ef09d83bc340c5634f8837aa310a7185dc3977c723e3f30394ef0a1b22b305442ac1d81460eebae30334a9ad03ad1f6fab26ba9275c0d3f1d0025a69c9f510dccea338b053e7860ebac709c86ce4d294a8120730354babc2ea725c31e41eebd4b99960dec13bc2743264bbe8ecf67cf8689a4c52daf997e9aff2d63b13897579bbed3a6a49857cf96b9b9f995ef40f392704f44760f8c0cc17bb7d7cffc1fc98effe6d47709ad", 0xf7, 0x6f}], 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt={'fowner>', r2}}]}) 17:02:18 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) [ 2384.636791] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 17:02:33 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) dup3(r0, r1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240), 0x0) 17:02:33 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, 0x0) ftruncate(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x20fc}], 0x0, &(0x7f0000000240)=ANY=[]) 17:02:33 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0xca1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000200)="f88d1472f1503a2762dc227e56f34e4dae53a5d2a2382bcc8887be80617a1dd6016849812efcf182747f82f6bcf496be352810be1f5b38611f56d76338150d05726e7545da998c284c93d70fa7d520ccf09768a7796688590af6bc6b27b76109b03f0d12e13652a02d7544640ebb47b9e8b5e4f5001907f4787ba3e81025952b406401c05c6881246fc91fa2ae95bc1478429f073288fe94c634c6404a90c6c5dd27ccb2930aac8dec64a5472329d22474e5dee9db57f086a8ed81daafed2e837d18d0b388db61847820d25ea5428c2fce54a471188dc128fbf24703543cf69b07993dfc7ca74179f8042e6c89", 0xed, 0x5}], 0xc00, &(0x7f0000000400)={[{@sbsector={'sbsector', 0x3d, 0xff}}], [{@smackfsroot={'smackfsroot', 0x3d, 'io\x00'}}, {@audit}, {@uid_lt={'uid<', r1}}]}) syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x1, 0x6, &(0x7f0000000a00)=[{&(0x7f0000000500)="5becdd33b7232cdabe5be761274be5c64b950645bbf9b2c20eef2c5a52c7bb2f42a95da9c3ae184b81a8534b738172c5e2e53967ee517b0c0083c4aec3023fea14c60d80d56e4d4dbe041da290e95056088cdf9a7d09db5b77158ae155aa3d1ecc423922a08ecb143f5556e7e33e6e5167a98035ee51b8a204ad58055fadac62fc63a02e15428260f5e18044cd257bda23", 0x91, 0xfffffffffffffffc}, {&(0x7f0000000680)="c480fa96016998c6e5232e472ce0ff2e5b3f8627888579cd6750adb1021d318d91e46d8cf242e0b79dbe56d160198954961e2b96d2429eaec3bc002cfdb8d8eb1319eb5c7df50ce03b75e14a94813c800f54fb94e6f20f7f2a7e1ed17f1851f54f687e610db52164bb7e82ec1585c1f0bf30379c6200f4de9f817e63281692d64620367af10017e56f660c09e0f74dfea7fde2762479f3be", 0x98, 0x9}, {&(0x7f0000000740)="3cd1e27bae50a3f11bd633871541f74eae39af90364bc1c04b8ee3e4823db7cf7cbaf5a017106c4712fc229dcfa619997ad24eec01ac82a156e14f3e950e0410efd9e27f3476157df83cc94c2585b95f1b6a36b20f56691889b3c4a9df555095412c342172436ae0e8debccaea3d92e7dcb1cc757211a551a8ec7b4e6fab2da15c96dc63f6f0a727276324", 0x8b, 0x2}, {&(0x7f00000005c0)="8f7834c0b9832b47648433f82dcc1d5e42ac17fa788a", 0x16, 0x4}, {&(0x7f0000000800)="a1b442049f9449ffd0bcce6af95e636535c45c70d873b4b950b4c1b6aeec25248a69821190795355b876a1b119898653823e9701aa2fa0916d7d4dc3a4f952454028c0c10451020a72bb52ff054efe50e6a6b7d7c2344d8d149ee25327834d5cbd636cd27d501c14a56d2a8386010d5d6a194a8411025fdc1cac29c19a08ae17762a631c1cecfcd6b7dc1941dd9682682888a62da1b3bcdbc54ab48b12edad5a85b943255600a73bf86332a3b89ea191bae2e018f9b54f407ede973499182da30e995fcec40ac29a726dc8783ad3c5980afd6793211faf307194e1", 0xdb, 0x6}, {&(0x7f0000000900)="b37ebfa264410ed0a89812b6de96a5d2bc1bef26e022b5e6cb767ac6b65922ad9ea310d293d49b00d3da1e9066ee7466343c9aa1fde1c5b5dffcb1253f62939004e39860f82e87b8046f68b00a57b21c4ef09d83bc340c5634f8837aa310a7185dc3977c723e3f30394ef0a1b22b305442ac1d81460eebae30334a9ad03ad1f6fab26ba9275c0d3f1d0025a69c9f510dccea338b053e7860ebac709c86ce4d294a8120730354babc2ea725c31e41eebd4b99960dec13bc2743264bbe8ecf67cf8689a4c52daf997e9aff2d63b13897579bbed3a6a49857cf96b9b9f995ef40f392704f44760f8c0cc17bb7d7cffc1fc98effe6d47709ad", 0xf7, 0x6f}], 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt={'fowner>', r1}}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:02:33 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:02:33 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:02:33 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000000000000000) 17:02:33 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', 0x0, 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:02:33 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) [ 2399.270661] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 17:02:33 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) dup3(r0, r1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) [ 2399.367392] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 17:02:33 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:02:33 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:02:33 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, 0x0, &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:02:33 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', 0x0, 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:02:33 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x1, 0x6, &(0x7f0000000a00)=[{&(0x7f0000000500)="5becdd33b7232cdabe5be761274be5c64b950645bbf9b2c20eef2c5a52c7bb2f42a95da9c3ae184b81a8534b738172c5e2e53967ee517b0c0083c4aec3023fea14c60d80d56e4d4dbe041da290e95056088cdf9a7d09db5b77158ae155aa3d1ecc423922a08ecb143f5556e7e33e6e5167a98035ee51b8a204ad58055fadac62fc63a02e15428260f5e18044cd257bda23", 0x91, 0xfffffffffffffffc}, {&(0x7f0000000680)="c480fa96016998c6e5232e472ce0ff2e5b3f8627888579cd6750adb1021d318d91e46d8cf242e0b79dbe56d160198954961e2b96d2429eaec3bc002cfdb8d8eb1319eb5c7df50ce03b75e14a94813c800f54fb94e6f20f7f2a7e1ed17f1851f54f687e610db52164bb7e82ec1585c1f0bf30379c6200f4de9f817e63281692d64620367af10017e56f660c09e0f74dfea7fde2762479f3be", 0x98, 0x9}, {&(0x7f0000000740)="3cd1e27bae50a3f11bd633871541f74eae39af90364bc1c04b8ee3e4823db7cf7cbaf5a017106c4712fc229dcfa619997ad24eec01ac82a156e14f3e950e0410efd9e27f3476157df83cc94c2585b95f1b6a36b20f56691889b3c4a9df555095412c342172436ae0e8debccaea3d92e7dcb1cc757211a551a8ec7b4e6fab2da15c96dc63f6f0a727276324", 0x8b, 0x2}, {&(0x7f00000005c0)="8f7834c0b9832b47648433f82dcc1d5e42ac17fa788a", 0x16, 0x4}, {&(0x7f0000000800)="a1b442049f9449ffd0bcce6af95e636535c45c70d873b4b950b4c1b6aeec25248a69821190795355b876a1b119898653823e9701aa2fa0916d7d4dc3a4f952454028c0c10451020a72bb52ff054efe50e6a6b7d7c2344d8d149ee25327834d5cbd636cd27d501c14a56d2a8386010d5d6a194a8411025fdc1cac29c19a08ae17762a631c1cecfcd6b7dc1941dd9682682888a62da1b3bcdbc54ab48b12edad5a85b943255600a73bf86332a3b89ea191bae2e018f9b54f407ede973499182da30e995fcec40ac29a726dc8783ad3c5980afd6793211faf307194e1", 0xdb, 0x6}, {&(0x7f0000000900)="b37ebfa264410ed0a89812b6de96a5d2bc1bef26e022b5e6cb767ac6b65922ad9ea310d293d49b00d3da1e9066ee7466343c9aa1fde1c5b5dffcb1253f62939004e39860f82e87b8046f68b00a57b21c4ef09d83bc340c5634f8837aa310a7185dc3977c723e3f30394ef0a1b22b305442ac1d81460eebae30334a9ad03ad1f6fab26ba9275c0d3f1d0025a69c9f510dccea338b053e7860ebac709c86ce4d294a8120730354babc2ea725c31e41eebd4b99960dec13bc2743264bbe8ecf67cf8689a4c52daf997e9aff2d63b13897579bbed3a6a49857cf96b9b9f995ef40f392704f44760f8c0cc17bb7d7cffc1fc98effe6d47709ad", 0xf7, 0x6f}], 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt={'fowner>', r1}}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:02:33 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) dup3(r0, r1, 0x0) 17:02:33 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4800000000000000) 17:02:33 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9bbb) 17:02:33 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) [ 2399.602871] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 17:02:49 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9bbb) 17:02:49 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x1, 0x6, &(0x7f0000000a00)=[{&(0x7f0000000500)="5becdd33b7232cdabe5be761274be5c64b950645bbf9b2c20eef2c5a52c7bb2f42a95da9c3ae184b81a8534b738172c5e2e53967ee517b0c0083c4aec3023fea14c60d80d56e4d4dbe041da290e95056088cdf9a7d09db5b77158ae155aa3d1ecc423922a08ecb143f5556e7e33e6e5167a98035ee51b8a204ad58055fadac62fc63a02e15428260f5e18044cd257bda23", 0x91, 0xfffffffffffffffc}, {&(0x7f0000000680)="c480fa96016998c6e5232e472ce0ff2e5b3f8627888579cd6750adb1021d318d91e46d8cf242e0b79dbe56d160198954961e2b96d2429eaec3bc002cfdb8d8eb1319eb5c7df50ce03b75e14a94813c800f54fb94e6f20f7f2a7e1ed17f1851f54f687e610db52164bb7e82ec1585c1f0bf30379c6200f4de9f817e63281692d64620367af10017e56f660c09e0f74dfea7fde2762479f3be", 0x98, 0x9}, {&(0x7f0000000740)="3cd1e27bae50a3f11bd633871541f74eae39af90364bc1c04b8ee3e4823db7cf7cbaf5a017106c4712fc229dcfa619997ad24eec01ac82a156e14f3e950e0410efd9e27f3476157df83cc94c2585b95f1b6a36b20f56691889b3c4a9df555095412c342172436ae0e8debccaea3d92e7dcb1cc757211a551a8ec7b4e6fab2da15c96dc63f6f0a727276324", 0x8b, 0x2}, {&(0x7f00000005c0)="8f7834c0b9832b47648433f82dcc1d5e42ac17fa788a", 0x16, 0x4}, {&(0x7f0000000800)="a1b442049f9449ffd0bcce6af95e636535c45c70d873b4b950b4c1b6aeec25248a69821190795355b876a1b119898653823e9701aa2fa0916d7d4dc3a4f952454028c0c10451020a72bb52ff054efe50e6a6b7d7c2344d8d149ee25327834d5cbd636cd27d501c14a56d2a8386010d5d6a194a8411025fdc1cac29c19a08ae17762a631c1cecfcd6b7dc1941dd9682682888a62da1b3bcdbc54ab48b12edad5a85b943255600a73bf86332a3b89ea191bae2e018f9b54f407ede973499182da30e995fcec40ac29a726dc8783ad3c5980afd6793211faf307194e1", 0xdb, 0x6}, {&(0x7f0000000900)="b37ebfa264410ed0a89812b6de96a5d2bc1bef26e022b5e6cb767ac6b65922ad9ea310d293d49b00d3da1e9066ee7466343c9aa1fde1c5b5dffcb1253f62939004e39860f82e87b8046f68b00a57b21c4ef09d83bc340c5634f8837aa310a7185dc3977c723e3f30394ef0a1b22b305442ac1d81460eebae30334a9ad03ad1f6fab26ba9275c0d3f1d0025a69c9f510dccea338b053e7860ebac709c86ce4d294a8120730354babc2ea725c31e41eebd4b99960dec13bc2743264bbe8ecf67cf8689a4c52daf997e9aff2d63b13897579bbed3a6a49857cf96b9b9f995ef40f392704f44760f8c0cc17bb7d7cffc1fc98effe6d47709ad", 0xf7, 0x6f}], 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:02:49 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, 0x0) ftruncate(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x20fc}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB]) 17:02:49 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4c00000000000000) 17:02:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) dup3(r0, r1, 0x0) 17:02:49 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:02:49 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, 0x0, &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:02:49 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', 0x0, 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:02:49 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) [ 2415.627146] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 17:02:49 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:02:50 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9bbb) 17:02:50 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) dup3(r0, r1, 0x0) [ 2415.745322] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 17:02:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x1, 0x6, &(0x7f0000000a00)=[{&(0x7f0000000500)="5becdd33b7232cdabe5be761274be5c64b950645bbf9b2c20eef2c5a52c7bb2f42a95da9c3ae184b81a8534b738172c5e2e53967ee517b0c0083c4aec3023fea14c60d80d56e4d4dbe041da290e95056088cdf9a7d09db5b77158ae155aa3d1ecc423922a08ecb143f5556e7e33e6e5167a98035ee51b8a204ad58055fadac62fc63a02e15428260f5e18044cd257bda23", 0x91, 0xfffffffffffffffc}, {&(0x7f0000000680)="c480fa96016998c6e5232e472ce0ff2e5b3f8627888579cd6750adb1021d318d91e46d8cf242e0b79dbe56d160198954961e2b96d2429eaec3bc002cfdb8d8eb1319eb5c7df50ce03b75e14a94813c800f54fb94e6f20f7f2a7e1ed17f1851f54f687e610db52164bb7e82ec1585c1f0bf30379c6200f4de9f817e63281692d64620367af10017e56f660c09e0f74dfea7fde2762479f3be", 0x98, 0x9}, {&(0x7f0000000740)="3cd1e27bae50a3f11bd633871541f74eae39af90364bc1c04b8ee3e4823db7cf7cbaf5a017106c4712fc229dcfa619997ad24eec01ac82a156e14f3e950e0410efd9e27f3476157df83cc94c2585b95f1b6a36b20f56691889b3c4a9df555095412c342172436ae0e8debccaea3d92e7dcb1cc757211a551a8ec7b4e6fab2da15c96dc63f6f0a727276324", 0x8b, 0x2}, {&(0x7f00000005c0)="8f7834c0b9832b47648433f82dcc1d5e42ac17fa788a", 0x16, 0x4}, {&(0x7f0000000800)="a1b442049f9449ffd0bcce6af95e636535c45c70d873b4b950b4c1b6aeec25248a69821190795355b876a1b119898653823e9701aa2fa0916d7d4dc3a4f952454028c0c10451020a72bb52ff054efe50e6a6b7d7c2344d8d149ee25327834d5cbd636cd27d501c14a56d2a8386010d5d6a194a8411025fdc1cac29c19a08ae17762a631c1cecfcd6b7dc1941dd9682682888a62da1b3bcdbc54ab48b12edad5a85b943255600a73bf86332a3b89ea191bae2e018f9b54f407ede973499182da30e995fcec40ac29a726dc8783ad3c5980afd6793211faf307194e1", 0xdb, 0x6}, {&(0x7f0000000900)="b37ebfa264410ed0a89812b6de96a5d2bc1bef26e022b5e6cb767ac6b65922ad9ea310d293d49b00d3da1e9066ee7466343c9aa1fde1c5b5dffcb1253f62939004e39860f82e87b8046f68b00a57b21c4ef09d83bc340c5634f8837aa310a7185dc3977c723e3f30394ef0a1b22b305442ac1d81460eebae30334a9ad03ad1f6fab26ba9275c0d3f1d0025a69c9f510dccea338b053e7860ebac709c86ce4d294a8120730354babc2ea725c31e41eebd4b99960dec13bc2743264bbe8ecf67cf8689a4c52daf997e9aff2d63b13897579bbed3a6a49857cf96b9b9f995ef40f392704f44760f8c0cc17bb7d7cffc1fc98effe6d47709ad", 0xf7, 0x6f}], 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:02:50 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) [ 2415.822695] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 17:02:50 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, 0x0, &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:03:05 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:03:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) dup3(r0, r1, 0x0) 17:03:05 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:03:05 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:03:05 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6800000000000000) 17:03:05 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) 17:03:05 executing program 6: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:03:05 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x1, 0x6, &(0x7f0000000a00)=[{&(0x7f0000000500)="5becdd33b7232cdabe5be761274be5c64b950645bbf9b2c20eef2c5a52c7bb2f42a95da9c3ae184b81a8534b738172c5e2e53967ee517b0c0083c4aec3023fea14c60d80d56e4d4dbe041da290e95056088cdf9a7d09db5b77158ae155aa3d1ecc423922a08ecb143f5556e7e33e6e5167a98035ee51b8a204ad58055fadac62fc63a02e15428260f5e18044cd257bda23", 0x91, 0xfffffffffffffffc}, {&(0x7f0000000680)="c480fa96016998c6e5232e472ce0ff2e5b3f8627888579cd6750adb1021d318d91e46d8cf242e0b79dbe56d160198954961e2b96d2429eaec3bc002cfdb8d8eb1319eb5c7df50ce03b75e14a94813c800f54fb94e6f20f7f2a7e1ed17f1851f54f687e610db52164bb7e82ec1585c1f0bf30379c6200f4de9f817e63281692d64620367af10017e56f660c09e0f74dfea7fde2762479f3be", 0x98, 0x9}, {&(0x7f0000000740)="3cd1e27bae50a3f11bd633871541f74eae39af90364bc1c04b8ee3e4823db7cf7cbaf5a017106c4712fc229dcfa619997ad24eec01ac82a156e14f3e950e0410efd9e27f3476157df83cc94c2585b95f1b6a36b20f56691889b3c4a9df555095412c342172436ae0e8debccaea3d92e7dcb1cc757211a551a8ec7b4e6fab2da15c96dc63f6f0a727276324", 0x8b, 0x2}, {&(0x7f00000005c0)="8f7834c0b9832b47648433f82dcc1d5e42ac17fa788a", 0x16, 0x4}, {&(0x7f0000000800)="a1b442049f9449ffd0bcce6af95e636535c45c70d873b4b950b4c1b6aeec25248a69821190795355b876a1b119898653823e9701aa2fa0916d7d4dc3a4f952454028c0c10451020a72bb52ff054efe50e6a6b7d7c2344d8d149ee25327834d5cbd636cd27d501c14a56d2a8386010d5d6a194a8411025fdc1cac29c19a08ae17762a631c1cecfcd6b7dc1941dd9682682888a62da1b3bcdbc54ab48b12edad5a85b943255600a73bf86332a3b89ea191bae2e018f9b54f407ede973499182da30e995fcec40ac29a726dc8783ad3c5980afd6793211faf307194e1", 0xdb, 0x6}, {&(0x7f0000000900)="b37ebfa264410ed0a89812b6de96a5d2bc1bef26e022b5e6cb767ac6b65922ad9ea310d293d49b00d3da1e9066ee7466343c9aa1fde1c5b5dffcb1253f62939004e39860f82e87b8046f68b00a57b21c4ef09d83bc340c5634f8837aa310a7185dc3977c723e3f30394ef0a1b22b305442ac1d81460eebae30334a9ad03ad1f6fab26ba9275c0d3f1d0025a69c9f510dccea338b053e7860ebac709c86ce4d294a8120730354babc2ea725c31e41eebd4b99960dec13bc2743264bbe8ecf67cf8689a4c52daf997e9aff2d63b13897579bbed3a6a49857cf96b9b9f995ef40f392704f44760f8c0cc17bb7d7cffc1fc98effe6d47709ad", 0xf7, 0x6f}], 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:03:05 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) 17:03:05 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) dup3(r0, r1, 0x0) [ 2431.180711] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 17:03:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r0, r1, 0x0) 17:03:05 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0), 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:03:05 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:03:05 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) dup3(r0, r1, 0x0) 17:03:05 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:03:05 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) 17:03:05 executing program 2: syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0x1, 0x6, &(0x7f0000000a00)=[{&(0x7f0000000500)="5becdd33b7232cdabe5be761274be5c64b950645bbf9b2c20eef2c5a52c7bb2f42a95da9c3ae184b81a8534b738172c5e2e53967ee517b0c0083c4aec3023fea14c60d80d56e4d4dbe041da290e95056088cdf9a7d09db5b77158ae155aa3d1ecc423922a08ecb143f5556e7e33e6e5167a98035ee51b8a204ad58055fadac62fc63a02e15428260f5e18044cd257bda23", 0x91, 0xfffffffffffffffc}, {&(0x7f0000000680)="c480fa96016998c6e5232e472ce0ff2e5b3f8627888579cd6750adb1021d318d91e46d8cf242e0b79dbe56d160198954961e2b96d2429eaec3bc002cfdb8d8eb1319eb5c7df50ce03b75e14a94813c800f54fb94e6f20f7f2a7e1ed17f1851f54f687e610db52164bb7e82ec1585c1f0bf30379c6200f4de9f817e63281692d64620367af10017e56f660c09e0f74dfea7fde2762479f3be", 0x98, 0x9}, {&(0x7f0000000740)="3cd1e27bae50a3f11bd633871541f74eae39af90364bc1c04b8ee3e4823db7cf7cbaf5a017106c4712fc229dcfa619997ad24eec01ac82a156e14f3e950e0410efd9e27f3476157df83cc94c2585b95f1b6a36b20f56691889b3c4a9df555095412c342172436ae0e8debccaea3d92e7dcb1cc757211a551a8ec7b4e6fab2da15c96dc63f6f0a727276324", 0x8b, 0x2}, {&(0x7f00000005c0)="8f7834c0b9832b47648433f82dcc1d5e42ac17fa788a", 0x16, 0x4}, {&(0x7f0000000800)="a1b442049f9449ffd0bcce6af95e636535c45c70d873b4b950b4c1b6aeec25248a69821190795355b876a1b119898653823e9701aa2fa0916d7d4dc3a4f952454028c0c10451020a72bb52ff054efe50e6a6b7d7c2344d8d149ee25327834d5cbd636cd27d501c14a56d2a8386010d5d6a194a8411025fdc1cac29c19a08ae17762a631c1cecfcd6b7dc1941dd9682682888a62da1b3bcdbc54ab48b12edad5a85b943255600a73bf86332a3b89ea191bae2e018f9b54f407ede973499182da30e995fcec40ac29a726dc8783ad3c5980afd6793211faf307194e1", 0xdb, 0x6}, {&(0x7f0000000900)="b37ebfa264410ed0a89812b6de96a5d2bc1bef26e022b5e6cb767ac6b65922ad9ea310d293d49b00d3da1e9066ee7466343c9aa1fde1c5b5dffcb1253f62939004e39860f82e87b8046f68b00a57b21c4ef09d83bc340c5634f8837aa310a7185dc3977c723e3f30394ef0a1b22b305442ac1d81460eebae30334a9ad03ad1f6fab26ba9275c0d3f1d0025a69c9f510dccea338b053e7860ebac709c86ce4d294a8120730354babc2ea725c31e41eebd4b99960dec13bc2743264bbe8ecf67cf8689a4c52daf997e9aff2d63b13897579bbed3a6a49857cf96b9b9f995ef40f392704f44760f8c0cc17bb7d7cffc1fc98effe6d47709ad", 0xf7, 0x6f}], 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:03:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(r0, r1, 0x0) 17:03:05 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0), 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:03:05 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6c00000000000000) 17:03:05 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) dup3(r0, r1, 0x0) 17:03:05 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:03:05 executing program 1: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:03:23 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7400000000000000) 17:03:23 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:03:23 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0xca1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000200)="f88d1472f1503a2762dc227e56f34e4dae53a5d2a2382bcc8887be80617a1dd6016849812efcf182747f82f6bcf496be352810be1f5b38611f56d76338150d05726e7545da998c284c93d70fa7d520ccf09768a7796688590af6bc6b27b76109b03f0d12e13652a02d7544640ebb47b9e8b5e4f5001907f4787ba3e81025952b406401c05c6881246fc91fa2ae95bc1478429f073288fe94c634c6404a90c6c5dd27ccb2930aac8dec64a5472329d22474e5dee9db57f086a8ed81daafed2e837d18d0b388db61847820d25ea5428c2fce54a471188dc128fbf24703543cf69b07993dfc7ca74179f8042e6c89", 0xed, 0x5}], 0xc00, &(0x7f0000000400)={[{@sbsector={'sbsector', 0x3d, 0xff}}], [{@smackfsroot={'smackfsroot', 0x3d, 'io\x00'}}, {@audit}, {@uid_lt={'uid<', r1}}]}) syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x1, 0x6, &(0x7f0000000a00)=[{&(0x7f0000000500)="5becdd33b7232cdabe5be761274be5c64b950645bbf9b2c20eef2c5a52c7bb2f42a95da9c3ae184b81a8534b738172c5e2e53967ee517b0c0083c4aec3023fea14c60d80d56e4d4dbe041da290e95056088cdf9a7d09db5b77158ae155aa3d1ecc423922a08ecb143f5556e7e33e6e5167a98035ee51b8a204ad58055fadac62fc63a02e15428260f5e18044cd257bda23", 0x91, 0xfffffffffffffffc}, {&(0x7f0000000680)="c480fa96016998c6e5232e472ce0ff2e5b3f8627888579cd6750adb1021d318d91e46d8cf242e0b79dbe56d160198954961e2b96d2429eaec3bc002cfdb8d8eb1319eb5c7df50ce03b75e14a94813c800f54fb94e6f20f7f2a7e1ed17f1851f54f687e610db52164bb7e82ec1585c1f0bf30379c6200f4de9f817e63281692d64620367af10017e56f660c09e0f74dfea7fde2762479f3be", 0x98, 0x9}, {&(0x7f0000000740)="3cd1e27bae50a3f11bd633871541f74eae39af90364bc1c04b8ee3e4823db7cf7cbaf5a017106c4712fc229dcfa619997ad24eec01ac82a156e14f3e950e0410efd9e27f3476157df83cc94c2585b95f1b6a36b20f56691889b3c4a9df555095412c342172436ae0e8debccaea3d92e7dcb1cc757211a551a8ec7b4e6fab2da15c96dc63f6f0a727276324", 0x8b, 0x2}, {&(0x7f00000005c0)="8f7834c0b9832b47648433f82dcc1d5e42ac17fa788a", 0x16, 0x4}, {&(0x7f0000000800)="a1b442049f9449ffd0bcce6af95e636535c45c70d873b4b950b4c1b6aeec25248a69821190795355b876a1b119898653823e9701aa2fa0916d7d4dc3a4f952454028c0c10451020a72bb52ff054efe50e6a6b7d7c2344d8d149ee25327834d5cbd636cd27d501c14a56d2a8386010d5d6a194a8411025fdc1cac29c19a08ae17762a631c1cecfcd6b7dc1941dd9682682888a62da1b3bcdbc54ab48b12edad5a85b943255600a73bf86332a3b89ea191bae2e018f9b54f407ede973499182da30e995fcec40ac29a726dc8783ad3c5980afd6793211faf307194e1", 0xdb, 0x6}, {&(0x7f0000000900)="b37ebfa264410ed0a89812b6de96a5d2bc1bef26e022b5e6cb767ac6b65922ad9ea310d293d49b00d3da1e9066ee7466343c9aa1fde1c5b5dffcb1253f62939004e39860f82e87b8046f68b00a57b21c4ef09d83bc340c5634f8837aa310a7185dc3977c723e3f30394ef0a1b22b305442ac1d81460eebae30334a9ad03ad1f6fab26ba9275c0d3f1d0025a69c9f510dccea338b053e7860ebac709c86ce4d294a8120730354babc2ea725c31e41eebd4b99960dec13bc2743264bbe8ecf67cf8689a4c52daf997e9aff2d63b13897579bbed3a6a49857cf96b9b9f995ef40f392704f44760f8c0cc17bb7d7cffc1fc98effe6d47709ad", 0xf7, 0x6f}], 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt={'fowner>', r1}}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:03:23 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:03:23 executing program 2: syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0x1, 0x6, &(0x7f0000000a00)=[{&(0x7f0000000500)="5becdd33b7232cdabe5be761274be5c64b950645bbf9b2c20eef2c5a52c7bb2f42a95da9c3ae184b81a8534b738172c5e2e53967ee517b0c0083c4aec3023fea14c60d80d56e4d4dbe041da290e95056088cdf9a7d09db5b77158ae155aa3d1ecc423922a08ecb143f5556e7e33e6e5167a98035ee51b8a204ad58055fadac62fc63a02e15428260f5e18044cd257bda23", 0x91, 0xfffffffffffffffc}, {&(0x7f0000000680)="c480fa96016998c6e5232e472ce0ff2e5b3f8627888579cd6750adb1021d318d91e46d8cf242e0b79dbe56d160198954961e2b96d2429eaec3bc002cfdb8d8eb1319eb5c7df50ce03b75e14a94813c800f54fb94e6f20f7f2a7e1ed17f1851f54f687e610db52164bb7e82ec1585c1f0bf30379c6200f4de9f817e63281692d64620367af10017e56f660c09e0f74dfea7fde2762479f3be", 0x98, 0x9}, {&(0x7f0000000740)="3cd1e27bae50a3f11bd633871541f74eae39af90364bc1c04b8ee3e4823db7cf7cbaf5a017106c4712fc229dcfa619997ad24eec01ac82a156e14f3e950e0410efd9e27f3476157df83cc94c2585b95f1b6a36b20f56691889b3c4a9df555095412c342172436ae0e8debccaea3d92e7dcb1cc757211a551a8ec7b4e6fab2da15c96dc63f6f0a727276324", 0x8b, 0x2}, {&(0x7f00000005c0)="8f7834c0b9832b47648433f82dcc1d5e42ac17fa788a", 0x16, 0x4}, {&(0x7f0000000800)="a1b442049f9449ffd0bcce6af95e636535c45c70d873b4b950b4c1b6aeec25248a69821190795355b876a1b119898653823e9701aa2fa0916d7d4dc3a4f952454028c0c10451020a72bb52ff054efe50e6a6b7d7c2344d8d149ee25327834d5cbd636cd27d501c14a56d2a8386010d5d6a194a8411025fdc1cac29c19a08ae17762a631c1cecfcd6b7dc1941dd9682682888a62da1b3bcdbc54ab48b12edad5a85b943255600a73bf86332a3b89ea191bae2e018f9b54f407ede973499182da30e995fcec40ac29a726dc8783ad3c5980afd6793211faf307194e1", 0xdb, 0x6}, {&(0x7f0000000900)="b37ebfa264410ed0a89812b6de96a5d2bc1bef26e022b5e6cb767ac6b65922ad9ea310d293d49b00d3da1e9066ee7466343c9aa1fde1c5b5dffcb1253f62939004e39860f82e87b8046f68b00a57b21c4ef09d83bc340c5634f8837aa310a7185dc3977c723e3f30394ef0a1b22b305442ac1d81460eebae30334a9ad03ad1f6fab26ba9275c0d3f1d0025a69c9f510dccea338b053e7860ebac709c86ce4d294a8120730354babc2ea725c31e41eebd4b99960dec13bc2743264bbe8ecf67cf8689a4c52daf997e9aff2d63b13897579bbed3a6a49857cf96b9b9f995ef40f392704f44760f8c0cc17bb7d7cffc1fc98effe6d47709ad", 0xf7, 0x6f}], 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:03:23 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r0, r1, 0x0) 17:03:23 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) dup3(r0, r1, 0x0) 17:03:23 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0), 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:03:37 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) dup3(r0, r1, 0x0) 17:03:37 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:03:37 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7a00000000000000) 17:03:37 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:03:37 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:03:37 executing program 1: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, 0x0, &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:03:37 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:03:37 executing program 2: syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0x1, 0x6, &(0x7f0000000a00)=[{&(0x7f0000000500)="5becdd33b7232cdabe5be761274be5c64b950645bbf9b2c20eef2c5a52c7bb2f42a95da9c3ae184b81a8534b738172c5e2e53967ee517b0c0083c4aec3023fea14c60d80d56e4d4dbe041da290e95056088cdf9a7d09db5b77158ae155aa3d1ecc423922a08ecb143f5556e7e33e6e5167a98035ee51b8a204ad58055fadac62fc63a02e15428260f5e18044cd257bda23", 0x91, 0xfffffffffffffffc}, {&(0x7f0000000680)="c480fa96016998c6e5232e472ce0ff2e5b3f8627888579cd6750adb1021d318d91e46d8cf242e0b79dbe56d160198954961e2b96d2429eaec3bc002cfdb8d8eb1319eb5c7df50ce03b75e14a94813c800f54fb94e6f20f7f2a7e1ed17f1851f54f687e610db52164bb7e82ec1585c1f0bf30379c6200f4de9f817e63281692d64620367af10017e56f660c09e0f74dfea7fde2762479f3be", 0x98, 0x9}, {&(0x7f0000000740)="3cd1e27bae50a3f11bd633871541f74eae39af90364bc1c04b8ee3e4823db7cf7cbaf5a017106c4712fc229dcfa619997ad24eec01ac82a156e14f3e950e0410efd9e27f3476157df83cc94c2585b95f1b6a36b20f56691889b3c4a9df555095412c342172436ae0e8debccaea3d92e7dcb1cc757211a551a8ec7b4e6fab2da15c96dc63f6f0a727276324", 0x8b, 0x2}, {&(0x7f00000005c0)="8f7834c0b9832b47648433f82dcc1d5e42ac17fa788a", 0x16, 0x4}, {&(0x7f0000000800)="a1b442049f9449ffd0bcce6af95e636535c45c70d873b4b950b4c1b6aeec25248a69821190795355b876a1b119898653823e9701aa2fa0916d7d4dc3a4f952454028c0c10451020a72bb52ff054efe50e6a6b7d7c2344d8d149ee25327834d5cbd636cd27d501c14a56d2a8386010d5d6a194a8411025fdc1cac29c19a08ae17762a631c1cecfcd6b7dc1941dd9682682888a62da1b3bcdbc54ab48b12edad5a85b943255600a73bf86332a3b89ea191bae2e018f9b54f407ede973499182da30e995fcec40ac29a726dc8783ad3c5980afd6793211faf307194e1", 0xdb, 0x6}, {&(0x7f0000000900)="b37ebfa264410ed0a89812b6de96a5d2bc1bef26e022b5e6cb767ac6b65922ad9ea310d293d49b00d3da1e9066ee7466343c9aa1fde1c5b5dffcb1253f62939004e39860f82e87b8046f68b00a57b21c4ef09d83bc340c5634f8837aa310a7185dc3977c723e3f30394ef0a1b22b305442ac1d81460eebae30334a9ad03ad1f6fab26ba9275c0d3f1d0025a69c9f510dccea338b053e7860ebac709c86ce4d294a8120730354babc2ea725c31e41eebd4b99960dec13bc2743264bbe8ecf67cf8689a4c52daf997e9aff2d63b13897579bbed3a6a49857cf96b9b9f995ef40f392704f44760f8c0cc17bb7d7cffc1fc98effe6d47709ad", 0xf7, 0x6f}], 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:03:37 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 17:03:37 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:03:37 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) dup3(r0, r1, 0x0) 17:03:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), 0x0, 0x1, 0x6, &(0x7f0000000a00)=[{&(0x7f0000000500)="5becdd33b7232cdabe5be761274be5c64b950645bbf9b2c20eef2c5a52c7bb2f42a95da9c3ae184b81a8534b738172c5e2e53967ee517b0c0083c4aec3023fea14c60d80d56e4d4dbe041da290e95056088cdf9a7d09db5b77158ae155aa3d1ecc423922a08ecb143f5556e7e33e6e5167a98035ee51b8a204ad58055fadac62fc63a02e15428260f5e18044cd257bda23", 0x91, 0xfffffffffffffffc}, {&(0x7f0000000680)="c480fa96016998c6e5232e472ce0ff2e5b3f8627888579cd6750adb1021d318d91e46d8cf242e0b79dbe56d160198954961e2b96d2429eaec3bc002cfdb8d8eb1319eb5c7df50ce03b75e14a94813c800f54fb94e6f20f7f2a7e1ed17f1851f54f687e610db52164bb7e82ec1585c1f0bf30379c6200f4de9f817e63281692d64620367af10017e56f660c09e0f74dfea7fde2762479f3be", 0x98, 0x9}, {&(0x7f0000000740)="3cd1e27bae50a3f11bd633871541f74eae39af90364bc1c04b8ee3e4823db7cf7cbaf5a017106c4712fc229dcfa619997ad24eec01ac82a156e14f3e950e0410efd9e27f3476157df83cc94c2585b95f1b6a36b20f56691889b3c4a9df555095412c342172436ae0e8debccaea3d92e7dcb1cc757211a551a8ec7b4e6fab2da15c96dc63f6f0a727276324", 0x8b, 0x2}, {&(0x7f00000005c0)="8f7834c0b9832b47648433f82dcc1d5e42ac17fa788a", 0x16, 0x4}, {&(0x7f0000000800)="a1b442049f9449ffd0bcce6af95e636535c45c70d873b4b950b4c1b6aeec25248a69821190795355b876a1b119898653823e9701aa2fa0916d7d4dc3a4f952454028c0c10451020a72bb52ff054efe50e6a6b7d7c2344d8d149ee25327834d5cbd636cd27d501c14a56d2a8386010d5d6a194a8411025fdc1cac29c19a08ae17762a631c1cecfcd6b7dc1941dd9682682888a62da1b3bcdbc54ab48b12edad5a85b943255600a73bf86332a3b89ea191bae2e018f9b54f407ede973499182da30e995fcec40ac29a726dc8783ad3c5980afd6793211faf307194e1", 0xdb, 0x6}, {&(0x7f0000000900)="b37ebfa264410ed0a89812b6de96a5d2bc1bef26e022b5e6cb767ac6b65922ad9ea310d293d49b00d3da1e9066ee7466343c9aa1fde1c5b5dffcb1253f62939004e39860f82e87b8046f68b00a57b21c4ef09d83bc340c5634f8837aa310a7185dc3977c723e3f30394ef0a1b22b305442ac1d81460eebae30334a9ad03ad1f6fab26ba9275c0d3f1d0025a69c9f510dccea338b053e7860ebac709c86ce4d294a8120730354babc2ea725c31e41eebd4b99960dec13bc2743264bbe8ecf67cf8689a4c52daf997e9aff2d63b13897579bbed3a6a49857cf96b9b9f995ef40f392704f44760f8c0cc17bb7d7cffc1fc98effe6d47709ad", 0xf7, 0x6f}], 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:03:37 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:03:37 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:03:37 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:03:37 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r0, r1, 0x0) 17:03:38 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 17:03:38 executing program 1: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:03:38 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8004000000000000) 17:03:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), 0x0, 0x1, 0x6, &(0x7f0000000a00)=[{&(0x7f0000000500)="5becdd33b7232cdabe5be761274be5c64b950645bbf9b2c20eef2c5a52c7bb2f42a95da9c3ae184b81a8534b738172c5e2e53967ee517b0c0083c4aec3023fea14c60d80d56e4d4dbe041da290e95056088cdf9a7d09db5b77158ae155aa3d1ecc423922a08ecb143f5556e7e33e6e5167a98035ee51b8a204ad58055fadac62fc63a02e15428260f5e18044cd257bda23", 0x91, 0xfffffffffffffffc}, {&(0x7f0000000680)="c480fa96016998c6e5232e472ce0ff2e5b3f8627888579cd6750adb1021d318d91e46d8cf242e0b79dbe56d160198954961e2b96d2429eaec3bc002cfdb8d8eb1319eb5c7df50ce03b75e14a94813c800f54fb94e6f20f7f2a7e1ed17f1851f54f687e610db52164bb7e82ec1585c1f0bf30379c6200f4de9f817e63281692d64620367af10017e56f660c09e0f74dfea7fde2762479f3be", 0x98, 0x9}, {&(0x7f0000000740)="3cd1e27bae50a3f11bd633871541f74eae39af90364bc1c04b8ee3e4823db7cf7cbaf5a017106c4712fc229dcfa619997ad24eec01ac82a156e14f3e950e0410efd9e27f3476157df83cc94c2585b95f1b6a36b20f56691889b3c4a9df555095412c342172436ae0e8debccaea3d92e7dcb1cc757211a551a8ec7b4e6fab2da15c96dc63f6f0a727276324", 0x8b, 0x2}, {&(0x7f00000005c0)="8f7834c0b9832b47648433f82dcc1d5e42ac17fa788a", 0x16, 0x4}, {&(0x7f0000000800)="a1b442049f9449ffd0bcce6af95e636535c45c70d873b4b950b4c1b6aeec25248a69821190795355b876a1b119898653823e9701aa2fa0916d7d4dc3a4f952454028c0c10451020a72bb52ff054efe50e6a6b7d7c2344d8d149ee25327834d5cbd636cd27d501c14a56d2a8386010d5d6a194a8411025fdc1cac29c19a08ae17762a631c1cecfcd6b7dc1941dd9682682888a62da1b3bcdbc54ab48b12edad5a85b943255600a73bf86332a3b89ea191bae2e018f9b54f407ede973499182da30e995fcec40ac29a726dc8783ad3c5980afd6793211faf307194e1", 0xdb, 0x6}, {&(0x7f0000000900)="b37ebfa264410ed0a89812b6de96a5d2bc1bef26e022b5e6cb767ac6b65922ad9ea310d293d49b00d3da1e9066ee7466343c9aa1fde1c5b5dffcb1253f62939004e39860f82e87b8046f68b00a57b21c4ef09d83bc340c5634f8837aa310a7185dc3977c723e3f30394ef0a1b22b305442ac1d81460eebae30334a9ad03ad1f6fab26ba9275c0d3f1d0025a69c9f510dccea338b053e7860ebac709c86ce4d294a8120730354babc2ea725c31e41eebd4b99960dec13bc2743264bbe8ecf67cf8689a4c52daf997e9aff2d63b13897579bbed3a6a49857cf96b9b9f995ef40f392704f44760f8c0cc17bb7d7cffc1fc98effe6d47709ad", 0xf7, 0x6f}], 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:03:38 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 17:03:38 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(r0, r1, 0x0) 17:03:38 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:03:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), 0x0, 0x1, 0x6, &(0x7f0000000a00)=[{&(0x7f0000000500)="5becdd33b7232cdabe5be761274be5c64b950645bbf9b2c20eef2c5a52c7bb2f42a95da9c3ae184b81a8534b738172c5e2e53967ee517b0c0083c4aec3023fea14c60d80d56e4d4dbe041da290e95056088cdf9a7d09db5b77158ae155aa3d1ecc423922a08ecb143f5556e7e33e6e5167a98035ee51b8a204ad58055fadac62fc63a02e15428260f5e18044cd257bda23", 0x91, 0xfffffffffffffffc}, {&(0x7f0000000680)="c480fa96016998c6e5232e472ce0ff2e5b3f8627888579cd6750adb1021d318d91e46d8cf242e0b79dbe56d160198954961e2b96d2429eaec3bc002cfdb8d8eb1319eb5c7df50ce03b75e14a94813c800f54fb94e6f20f7f2a7e1ed17f1851f54f687e610db52164bb7e82ec1585c1f0bf30379c6200f4de9f817e63281692d64620367af10017e56f660c09e0f74dfea7fde2762479f3be", 0x98, 0x9}, {&(0x7f0000000740)="3cd1e27bae50a3f11bd633871541f74eae39af90364bc1c04b8ee3e4823db7cf7cbaf5a017106c4712fc229dcfa619997ad24eec01ac82a156e14f3e950e0410efd9e27f3476157df83cc94c2585b95f1b6a36b20f56691889b3c4a9df555095412c342172436ae0e8debccaea3d92e7dcb1cc757211a551a8ec7b4e6fab2da15c96dc63f6f0a727276324", 0x8b, 0x2}, {&(0x7f00000005c0)="8f7834c0b9832b47648433f82dcc1d5e42ac17fa788a", 0x16, 0x4}, {&(0x7f0000000800)="a1b442049f9449ffd0bcce6af95e636535c45c70d873b4b950b4c1b6aeec25248a69821190795355b876a1b119898653823e9701aa2fa0916d7d4dc3a4f952454028c0c10451020a72bb52ff054efe50e6a6b7d7c2344d8d149ee25327834d5cbd636cd27d501c14a56d2a8386010d5d6a194a8411025fdc1cac29c19a08ae17762a631c1cecfcd6b7dc1941dd9682682888a62da1b3bcdbc54ab48b12edad5a85b943255600a73bf86332a3b89ea191bae2e018f9b54f407ede973499182da30e995fcec40ac29a726dc8783ad3c5980afd6793211faf307194e1", 0xdb, 0x6}, {&(0x7f0000000900)="b37ebfa264410ed0a89812b6de96a5d2bc1bef26e022b5e6cb767ac6b65922ad9ea310d293d49b00d3da1e9066ee7466343c9aa1fde1c5b5dffcb1253f62939004e39860f82e87b8046f68b00a57b21c4ef09d83bc340c5634f8837aa310a7185dc3977c723e3f30394ef0a1b22b305442ac1d81460eebae30334a9ad03ad1f6fab26ba9275c0d3f1d0025a69c9f510dccea338b053e7860ebac709c86ce4d294a8120730354babc2ea725c31e41eebd4b99960dec13bc2743264bbe8ecf67cf8689a4c52daf997e9aff2d63b13897579bbed3a6a49857cf96b9b9f995ef40f392704f44760f8c0cc17bb7d7cffc1fc98effe6d47709ad", 0xf7, 0x6f}], 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:03:38 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:03:52 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', 0x0, 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:03:52 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:03:52 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8cffffff00000000) 17:03:52 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:03:52 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) dup3(r0, r1, 0x0) 17:03:52 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r0, r1, 0x0) 17:03:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000a00)=[{&(0x7f0000000500)="5becdd33b7232cdabe5be761274be5c64b950645bbf9b2c20eef2c5a52c7bb2f42a95da9c3ae184b81a8534b738172c5e2e53967ee517b0c0083c4aec3023fea14c60d80d56e4d4dbe041da290e95056088cdf9a7d09db5b77158ae155aa3d1ecc423922a08ecb143f5556e7e33e6e5167a98035ee51b8a204ad58055fadac62fc63a02e15428260f5e18044cd257bda23", 0x91, 0xfffffffffffffffc}, {&(0x7f0000000680)="c480fa96016998c6e5232e472ce0ff2e5b3f8627888579cd6750adb1021d318d91e46d8cf242e0b79dbe56d160198954961e2b96d2429eaec3bc002cfdb8d8eb1319eb5c7df50ce03b75e14a94813c800f54fb94e6f20f7f2a7e1ed17f1851f54f687e610db52164bb7e82ec1585c1f0bf30379c6200f4de9f817e63281692d64620367af10017e56f660c09e0f74dfea7fde2762479f3be", 0x98, 0x9}, {&(0x7f0000000740)="3cd1e27bae50a3f11bd633871541f74eae39af90364bc1c04b8ee3e4823db7cf7cbaf5a017106c4712fc229dcfa619997ad24eec01ac82a156e14f3e950e0410efd9e27f3476157df83cc94c2585b95f1b6a36b20f56691889b3c4a9df555095412c342172436ae0e8debccaea3d92e7dcb1cc757211a551a8ec7b4e6fab2da15c96dc63f6f0a727276324", 0x8b, 0x2}, {&(0x7f00000005c0)="8f7834c0b9832b47648433f82dcc1d5e42ac17fa788a", 0x16, 0x4}, {&(0x7f0000000800)="a1b442049f9449ffd0bcce6af95e636535c45c70d873b4b950b4c1b6aeec25248a69821190795355b876a1b119898653823e9701aa2fa0916d7d4dc3a4f952454028c0c10451020a72bb52ff054efe50e6a6b7d7c2344d8d149ee25327834d5cbd636cd27d501c14a56d2a8386010d5d6a194a8411025fdc1cac29c19a08ae17762a631c1cecfcd6b7dc1941dd9682682888a62da1b3bcdbc54ab48b12edad5a85b943255600a73bf86332a3b89ea191bae2e018f9b54f407ede973499182da30e995fcec40ac29a726dc8783ad3c5980afd6793211faf307194e1", 0xdb, 0x6}, {&(0x7f0000000900)="b37ebfa264410ed0a89812b6de96a5d2bc1bef26e022b5e6cb767ac6b65922ad9ea310d293d49b00d3da1e9066ee7466343c9aa1fde1c5b5dffcb1253f62939004e39860f82e87b8046f68b00a57b21c4ef09d83bc340c5634f8837aa310a7185dc3977c723e3f30394ef0a1b22b305442ac1d81460eebae30334a9ad03ad1f6fab26ba9275c0d3f1d0025a69c9f510dccea338b053e7860ebac709c86ce4d294a8120730354babc2ea725c31e41eebd4b99960dec13bc2743264bbe8ecf67cf8689a4c52daf997e9aff2d63b13897579bbed3a6a49857cf96b9b9f995ef40f392704f44760f8c0cc17bb7d7cffc1fc98effe6d47709ad", 0xf7, 0x6f}], 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:03:52 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) [ 2478.531798] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 17:03:52 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(0xffffffffffffffff, r0, 0x0) 17:03:52 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:04:07 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', 0x0, 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:04:07 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf002000000000000) 17:04:07 executing program 1: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8cffffff00000000) 17:04:07 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(0xffffffffffffffff, r0, 0x0) 17:04:07 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:04:07 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:04:07 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:04:07 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 17:04:07 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:04:07 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(0xffffffffffffffff, r0, 0x0) 17:04:07 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 17:04:07 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, 0x0, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:04:08 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:04:08 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x9bbb) 17:04:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:04:08 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:04:22 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr(0xffffffffffffffff, &(0x7f00000000c0)=@random={'system.', '/dev/snd/timer\x00'}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xf, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 17:04:22 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', 0x0, 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:04:22 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x9bbb) 17:04:22 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000a00)=[{&(0x7f0000000500)="5becdd33b7232cdabe5be761274be5c64b950645bbf9b2c20eef2c5a52c7bb2f42a95da9c3ae184b81a8534b738172c5e2e53967ee517b0c0083c4aec3023fea14c60d80d56e4d4dbe041da290e95056088cdf9a7d09db5b77158ae155aa3d1ecc423922a08ecb143f5556e7e33e6e5167a98035ee51b8a204ad58055fadac62fc63a02e15428260f5e18044cd257bda23", 0x91, 0xfffffffffffffffc}, {&(0x7f0000000680)="c480fa96016998c6e5232e472ce0ff2e5b3f8627888579cd6750adb1021d318d91e46d8cf242e0b79dbe56d160198954961e2b96d2429eaec3bc002cfdb8d8eb1319eb5c7df50ce03b75e14a94813c800f54fb94e6f20f7f2a7e1ed17f1851f54f687e610db52164bb7e82ec1585c1f0bf30379c6200f4de9f817e63281692d64620367af10017e56f660c09e0f74dfea7fde2762479f3be", 0x98, 0x9}, {&(0x7f0000000740)="3cd1e27bae50a3f11bd633871541f74eae39af90364bc1c04b8ee3e4823db7cf7cbaf5a017106c4712fc229dcfa619997ad24eec01ac82a156e14f3e950e0410efd9e27f3476157df83cc94c2585b95f1b6a36b20f56691889b3c4a9df555095412c342172436ae0e8debccaea3d92e7dcb1cc757211a551a8ec7b4e6fab2da15c96dc63f6f0a727276324", 0x8b, 0x2}, {&(0x7f00000005c0)="8f7834c0b9832b47648433f82dcc1d5e42ac17fa788a", 0x16, 0x4}, {&(0x7f0000000800)="a1b442049f9449ffd0bcce6af95e636535c45c70d873b4b950b4c1b6aeec25248a69821190795355b876a1b119898653823e9701aa2fa0916d7d4dc3a4f952454028c0c10451020a72bb52ff054efe50e6a6b7d7c2344d8d149ee25327834d5cbd636cd27d501c14a56d2a8386010d5d6a194a8411025fdc1cac29c19a08ae17762a631c1cecfcd6b7dc1941dd9682682888a62da1b3bcdbc54ab48b12edad5a85b943255600a73bf86332a3b89ea191bae2e018f9b54f407ede973499182da30e995fcec40ac29a726dc8783ad3c5980afd6793211faf307194e1", 0xdb, 0x6}], 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:04:22 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:04:22 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, 0x0, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:04:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:04:22 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf6ffffff00000000) [ 2508.665391] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 17:04:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:04:23 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, 0x0, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:04:23 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:04:23 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000a00)=[{&(0x7f0000000500)="5becdd33b7232cdabe5be761274be5c64b950645bbf9b2c20eef2c5a52c7bb2f42a95da9c3ae184b81a8534b738172c5e2e53967ee517b0c0083c4aec3023fea14c60d80d56e4d4dbe041da290e95056088cdf9a7d09db5b77158ae155aa3d1ecc423922a08ecb143f5556e7e33e6e5167a98035ee51b8a204ad58055fadac62fc63a02e15428260f5e18044cd257bda23", 0x91, 0xfffffffffffffffc}, {&(0x7f0000000680)="c480fa96016998c6e5232e472ce0ff2e5b3f8627888579cd6750adb1021d318d91e46d8cf242e0b79dbe56d160198954961e2b96d2429eaec3bc002cfdb8d8eb1319eb5c7df50ce03b75e14a94813c800f54fb94e6f20f7f2a7e1ed17f1851f54f687e610db52164bb7e82ec1585c1f0bf30379c6200f4de9f817e63281692d64620367af10017e56f660c09e0f74dfea7fde2762479f3be", 0x98, 0x9}, {&(0x7f0000000740)="3cd1e27bae50a3f11bd633871541f74eae39af90364bc1c04b8ee3e4823db7cf7cbaf5a017106c4712fc229dcfa619997ad24eec01ac82a156e14f3e950e0410efd9e27f3476157df83cc94c2585b95f1b6a36b20f56691889b3c4a9df555095412c342172436ae0e8debccaea3d92e7dcb1cc757211a551a8ec7b4e6fab2da15c96dc63f6f0a727276324", 0x8b, 0x2}, {&(0x7f00000005c0)="8f7834c0b9832b47648433f82dcc1d5e42ac17fa788a", 0x16, 0x4}], 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:04:23 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) [ 2508.789360] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 17:04:39 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(0xffffffffffffffff, r0, 0x0) 17:04:39 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfbffffff00000000) 17:04:39 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:04:39 executing program 1: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x74) 17:04:39 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x9bbb) 17:04:39 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:04:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000a00)=[{&(0x7f0000000500)="5becdd33b7232cdabe5be761274be5c64b950645bbf9b2c20eef2c5a52c7bb2f42a95da9c3ae184b81a8534b738172c5e2e53967ee517b0c0083c4aec3023fea14c60d80d56e4d4dbe041da290e95056088cdf9a7d09db5b77158ae155aa3d1ecc423922a08ecb143f5556e7e33e6e5167a98035ee51b8a204ad58055fadac62fc63a02e15428260f5e18044cd257bda23", 0x91, 0xfffffffffffffffc}, {&(0x7f0000000680)="c480fa96016998c6e5232e472ce0ff2e5b3f8627888579cd6750adb1021d318d91e46d8cf242e0b79dbe56d160198954961e2b96d2429eaec3bc002cfdb8d8eb1319eb5c7df50ce03b75e14a94813c800f54fb94e6f20f7f2a7e1ed17f1851f54f687e610db52164bb7e82ec1585c1f0bf30379c6200f4de9f817e63281692d64620367af10017e56f660c09e0f74dfea7fde2762479f3be", 0x98, 0x9}, {&(0x7f0000000740)="3cd1e27bae50a3f11bd633871541f74eae39af90364bc1c04b8ee3e4823db7cf7cbaf5a017106c4712fc229dcfa619997ad24eec01ac82a156e14f3e950e0410efd9e27f3476157df83cc94c2585b95f1b6a36b20f56691889b3c4a9df555095412c342172436ae0e8debccaea3d92e7dcb1cc757211a551a8ec7b4e6fab2da15c96dc63f6f0a727276324", 0x8b, 0x2}], 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:04:39 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) [ 2525.067133] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 17:04:39 executing program 1: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:04:39 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(0xffffffffffffffff, r0, 0x0) 17:04:39 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:04:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000500)="5becdd33b7232cdabe5be761274be5c64b950645bbf9b2c20eef2c5a52c7bb2f42a95da9c3ae184b81a8534b738172c5e2e53967ee517b0c0083c4aec3023fea14c60d80d56e4d4dbe041da290e95056088cdf9a7d09db5b77158ae155aa3d1ecc423922a08ecb143f5556e7e33e6e5167a98035ee51b8a204ad58055fadac62fc63a02e15428260f5e18044cd257bda23", 0x91, 0xfffffffffffffffc}, {&(0x7f0000000680)="c480fa96016998c6e5232e472ce0ff2e5b3f8627888579cd6750adb1021d318d91e46d8cf242e0b79dbe56d160198954961e2b96d2429eaec3bc002cfdb8d8eb1319eb5c7df50ce03b75e14a94813c800f54fb94e6f20f7f2a7e1ed17f1851f54f687e610db52164bb7e82ec1585c1f0bf30379c6200f4de9f817e63281692d64620367af10017e56f660c09e0f74dfea7fde2762479f3be", 0x98, 0x9}], 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:04:39 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) [ 2525.272276] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 17:04:39 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:04:39 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:04:39 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfeffffff00000000) 17:04:39 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(0xffffffffffffffff, r0, 0x0) 17:04:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000a00)=[{&(0x7f0000000500)="5becdd33b7232cdabe5be761274be5c64b950645bbf9b2c20eef2c5a52c7bb2f42a95da9c3ae184b81a8534b738172c5e2e53967ee517b0c0083c4aec3023fea14c60d80d56e4d4dbe041da290e95056088cdf9a7d09db5b77158ae155aa3d1ecc423922a08ecb143f5556e7e33e6e5167a98035ee51b8a204ad58055fadac62fc63a02e15428260f5e18044cd257bda23", 0x91, 0xfffffffffffffffc}], 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:04:39 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:04:39 executing program 1: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) [ 2525.455400] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 17:04:39 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:04:39 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180), 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:04:39 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:04:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x200002, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:04:39 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) [ 2525.656593] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 17:04:39 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:04:39 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:04:39 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:04:40 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:04:54 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:04:54 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff7f00000000) 17:04:54 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:04:54 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:04:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}, {@utf8no}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:04:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r1, 0x4, 0x42800) write(r1, &(0x7f0000000080)="1f", 0x1) r2 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) io_uring_enter(r2, 0x58ab, 0x0, 0x0, 0x0, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000140)={0x4, 0xffffffffffffffe1, 0x43}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x8, 0x7f, 0x9, 0x0, 0x0, 0x9c, 0x29108, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0xba, 0x6}, 0x40100, 0xb9f3, 0x1, 0x1, 0x79, 0x1, 0x101, 0x0, 0x401, 0x0, 0x4}, r0, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x7fff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 17:04:54 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:04:54 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) [ 2540.063984] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 17:04:54 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:04:54 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(0xffffffffffffffff, r1, 0x0, 0x9bbb) 17:04:54 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:04:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r1, 0x4, 0x42800) write(r1, &(0x7f0000000080)="1f", 0x1) r2 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) io_uring_enter(r2, 0x58ab, 0x0, 0x0, 0x0, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000140)={0x4, 0xffffffffffffffe1, 0x43}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x8, 0x7f, 0x9, 0x0, 0x0, 0x9c, 0x29108, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0xba, 0x6}, 0x40100, 0xb9f3, 0x1, 0x1, 0x79, 0x1, 0x101, 0x0, 0x401, 0x0, 0x4}, r0, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x7fff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 17:04:54 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:04:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:05:08 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffff00000000) 17:05:08 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', 0x0, &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:05:08 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, 0x0, 0x0) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:05:08 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:05:08 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(0xffffffffffffffff, r1, 0x0, 0x9bbb) 17:05:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r1, 0x4, 0x42800) write(r1, &(0x7f0000000080)="1f", 0x1) r2 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) io_uring_enter(r2, 0x58ab, 0x0, 0x0, 0x0, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000140)={0x4, 0xffffffffffffffe1, 0x43}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x8, 0x7f, 0x9, 0x0, 0x0, 0x9c, 0x29108, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0xba, 0x6}, 0x40100, 0xb9f3, 0x1, 0x1, 0x79, 0x1, 0x101, 0x0, 0x401, 0x0, 0x4}, r0, 0x10, r1, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x7fff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 17:05:08 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:05:08 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:05:29 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', 0x0, &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:05:29 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, 0x0, 0x0) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:05:29 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffffffffffff) 17:05:29 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:05:29 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:05:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:05:29 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(0xffffffffffffffff, r1, 0x0, 0x9bbb) 17:05:29 executing program 1: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(0xffffffffffffffff, r1, 0x0, 0x9bbb) 17:05:29 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000140)='\x00', 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, &(0x7f0000000040)) ftruncate(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed4100000008", 0x6, 0x20fc}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="28d0a5865f91e69933a151c11e47a054af5c5c27b5261ab0628bd5934edcbbca4dbd739610bf4d90472e537d236792e3130ca6b4c0a0a4735b54903ad43e4a6ab5d62f222e146828b21c"]) 17:05:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}, {@shortname_winnt}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:05:29 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:05:29 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:05:29 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, 0x0, 0x0) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:05:29 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) [ 2575.320951] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 17:05:29 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) close(r1) pipe(&(0x7f0000000100)={0xffffffffffffffff}) splice(r2, 0x0, r1, 0x0, 0xfdef, 0x0) r3 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) io_uring_enter(r3, 0x58ab, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0), 0x1a1a054, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d8cd09dece13ef7eedebf44451cdcb65ae4e42e2b112f421ee7bcc8242ae3d3afbd6579edc9164f6cc88d5dff2fdc327a03aca12c3569aebb34d088c38f5c23a3a06b2e71443a8b0f30ecf35230821dfb41eaa924df9d136a56ad3353d276b3a5846c1edc25d02e9e706f8ddc4c6f75fc95110106f6107943fbc552ce1e2ffa712c9a32f1ae0dcbf9a120a177de650874aa2c", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',msize=0x000000000000007d,cache=loose,dont_hash,smackfsfloor=[\'+@,smackfsdef=[\\,defcontext=user_u,smackfsfloor=,\x00']) ftruncate(r0, 0xffffffffffff7fff) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000100), 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105000, 0x100) 17:05:29 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="01"], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002900)=""/158, 0x9e}, 0x0, 0x2203}, 0x0) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000140), 0x91041, 0x0) dup3(r3, r4, 0x0) 17:05:29 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', 0x0, &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:05:29 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:05:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}, {@shortname_win95}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') [ 2575.531087] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 17:05:44 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:05:44 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:05:44 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000400)={0x0, 0x5df0, 0x4, 0x10000000}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x10400, 0x1) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) listxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)=""/171, 0xab) 17:05:44 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:05:44 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) [ 2589.865699] audit: type=1326 audit(1687712744.160:64): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31693 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe131b8cb19 code=0x0 17:05:44 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:05:44 executing program 1: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:05:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}, {@fat=@debug}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') [ 2589.902612] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 17:05:44 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:05:44 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:05:44 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:05:59 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:05:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:05:59 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:05:59 executing program 1: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:05:59 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x6f15, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x48}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 17:05:59 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:05:59 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:05:59 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) [ 2605.662128] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value [ 2605.666048] audit: type=1326 audit(1687712759.961:65): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31835 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe131b8cb19 code=0x0 17:06:00 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:06:00 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:06:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:06:00 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x0) 17:06:00 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(0x0, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) [ 2605.863887] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 17:06:00 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:06:00 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:06:00 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) close(r1) pipe(&(0x7f0000000100)={0xffffffffffffffff}) splice(r2, 0x0, r1, 0x0, 0xfdef, 0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000140)) 17:06:00 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) acct(&(0x7f00000000c0)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x5, 0x23, 0x0, 0x80000001}]}) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240), 0x0) 17:06:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@shortname_mixed}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') [ 2606.044648] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 17:06:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:06:15 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(0x0, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:06:15 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[0x0, &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) [ 2621.552303] audit: type=1326 audit(1687712775.848:66): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32258 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe131b8cb19 code=0x0 17:06:15 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) acct(&(0x7f00000000c0)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x5, 0x23, 0x0, 0x80000001}]}) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240), 0x0) 17:06:15 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:06:15 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x0) 17:06:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@rodir}, {@numtail}, {@fat=@debug}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:06:15 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0xad5323a13d55b4bb, 0x0) r1 = syz_io_uring_setup(0x613a, &(0x7f0000000080)={0x0, 0xd7d0, 0x4, 0x0, 0x3fffffff, 0x0, r0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200), &(0x7f00000001c0)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) close(r2) pipe(&(0x7f0000000100)={0xffffffffffffffff}) splice(r3, 0x0, r2, 0x0, 0xfdef, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r1, {0x8}}, './file1\x00'}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r4) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) sendmsg$NL80211_CMD_SET_INTERFACE(r4, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x64, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xaa5e, 0x4e}}}}, [@NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x4}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0xc}, @NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFTYPE={0x8}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0xa}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x40400c0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2621.611111] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 17:06:15 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) acct(&(0x7f00000000c0)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x5, 0x23, 0x0, 0x80000001}]}) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240), 0x0) 17:06:15 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x0) 17:06:15 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(0x0, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:06:15 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:06:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@rodir}, {@fat=@debug}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:06:16 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) acct(&(0x7f00000000c0)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x5, 0x23, 0x0, 0x80000001}]}) [ 2621.885128] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 17:06:32 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, 0x0, 0x183200) dup3(r0, r1, 0x0) 17:06:32 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, 0x0, &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:06:32 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[0x0, &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:06:32 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) acct(&(0x7f00000000c0)='./file0\x00') 17:06:32 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:06:32 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r1) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 17:06:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@fat=@debug}], [{@fowner_gt}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') 17:06:32 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[0x0, &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) [ 2637.800745] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 17:06:32 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, 0x0, &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:06:32 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:06:32 executing program 1: acct(&(0x7f00000000c0)='./file0\x00') 17:06:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@fat=@debug}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') [ 2637.874812] audit: type=1326 audit(1687712792.171:67): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32536 comm="syz-executor.6" exe="/syz-executor.6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f535f33bb19 code=0x0 17:06:32 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, 0x0, 0x183200) dup3(r0, r1, 0x0) [ 2637.924017] FAT-fs (loop2): bogus number of reserved sectors [ 2637.925308] FAT-fs (loop2): Can't find a valid FAT filesystem 17:06:32 executing program 1: acct(&(0x7f00000000c0)='./file0\x00') 17:06:32 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, 0x0, &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:06:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@fat=@debug}]}) syz_open_procfs(0xffffffffffffffff, 0x0) 17:06:32 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, 0x0, &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:06:32 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000140)) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 17:06:32 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[0x0, &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:06:32 executing program 1: acct(&(0x7f00000000c0)='./file0\x00') [ 2638.048108] FAT-fs (loop2): bogus number of reserved sectors [ 2638.049050] FAT-fs (loop2): Can't find a valid FAT filesystem 17:06:47 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', 0x0, 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:06:47 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, 0x0, 0x183200) dup3(r0, r1, 0x0) 17:06:47 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:06:47 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:06:47 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) acct(&(0x7f00000000c0)='./file0\x00') 17:06:47 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) io_uring_setup(0x20e9, &(0x7f0000000140)={0x0, 0x99e2, 0x0, 0x3, 0x332, 0x0, r0}) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="49c8780b398d4705b710273c5ac7654d8d4bf314f2eea3b3f823295ad73df8fcbda56398d880ec26ddecaa9d369452c14eabe491b18ae3ccca9585641ee358d62ebc3a0f7dabdfb56b2f87626e698aeb7ee7a19f964d0d243f58358b773b2acf3613379ed0c65f52601a553f2340f3ad3bd68c44b0004597f755d9371f88050fa53ee6cc60754c0d4030c2b865764347a2310814721df195b245a9b4146d7f736fd3b0611103044809b3822090ba526f8ea493b5c639a82a499e398e73a9d0e6b427f1d3fca9520f699e5dfb350fa72dd421d1ab057c3ca038ee08cd3fc9f540c8566dc8a0b0058c47d37aaec805000000000000"], 0x31b) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) close(r2) pipe(&(0x7f0000000100)={0xffffffffffffffff}) splice(r3, 0x0, r2, 0x0, 0xfdef, 0x0) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f00000001c0)={0x0, 0x4a48, 0xfc00}) close(r1) r4 = dup(0xffffffffffffffff) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = eventfd(0x1f) pidfd_getfd(r4, r5, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 17:06:47 executing program 2: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:06:47 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) [ 2653.677749] audit: type=1326 audit(1687712807.973:68): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32964 comm="syz-executor.6" exe="/syz-executor.6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f535f33bb19 code=0x0 17:06:48 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) acct(&(0x7f00000000c0)='./file0\x00') 17:06:48 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r0, r1, 0x0) 17:06:48 executing program 2: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:06:48 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', 0x0, 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:07:05 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x183200) dup3(r0, r1, 0x0) 17:07:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(0xffffffffffffffff, r0, 0x0) 17:07:05 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) acct(&(0x7f00000000c0)='./file0\x00') 17:07:05 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', 0x0, 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:07:05 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:07:05 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) fsync(r0) close(r1) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 17:07:05 executing program 2: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:07:05 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:07:05 executing program 2: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:07:05 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:07:05 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) acct(&(0x7f00000000c0)='./file0\x00') [ 2671.177492] audit: type=1326 audit(1687712825.473:69): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33199 comm="syz-executor.6" exe="/syz-executor.6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f535f33bb19 code=0x0 17:07:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(0xffffffffffffffff, r0, 0x0) 17:07:05 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:07:05 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:07:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(0xffffffffffffffff, r0, 0x0) 17:07:05 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000140)='\x00', 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, &(0x7f0000000040)) ftruncate(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed4100000008", 0x6, 0x20fc}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="28d0a5865f91e69933a151c11e47a054af5c5c27b5261ab0628bd5934edcbbca4dbd739610bf4d90472e537d236792e3130ca6b4c0a0a4735b54903ad43e4a6ab5d62f222e146828b21c"]) 17:07:20 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) acct(&(0x7f00000000c0)='./file0\x00') 17:07:20 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000240)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000000340)="5a320df618ecf8e33da57bcaf97eeb070f706abdc87e521016728912d0b5a857450b16bf710482081e5beb485adc0bf6251729789c8515581f57de2b4d41a321bf9ba3cdc7d84db5244ed25472516eead7b85f68b9d6972d5bc9ea7a1c13854a83f0d5a61d40a50c5b8d2927e5def229ef5c979db8796d1ca3ee7b8c03d0d602a1542566606eac45dbfc93a2ae178986951e1975b1199b56cb4022cd05a180a6a4c6c717a0de4eeea24bb6c816dad60bedbf5a", 0xb3}, {&(0x7f0000000400)="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", 0xff, 0x400}, {&(0x7f0000000500)="417b5f8cbeed8b6a39ce3e3defe36c5a6f09422300bea9ebf296964fe7df2ff7ea315d8e2dbd74a8a5ca3184c9c89f4d2504ee3b4d7b288e5bf225805e003764a990e4675ffccc6d42c9d1e060e99f3c9d8992a36761264b2bf0b5e40c8a10129209177b4d66a147708443f1b09b1e6373c3b22b80a36b11f0021c6d69ca654329de5cbb3dcf56ada47dbfdcf8df1fe2a1aec4d18cb5ffd9beb03f8865bab9878ce14b00ba939d10a3b480c7dbcf49df7fffc45c698357c492daf859ffd0cc8c1199ed60c52fc757f64720871b264a461633f34a544ac441663412095caffbab7dc03c9ae2f370643daf15d391afdddd128ba97255b8ace478664ac56d16062e908dbbd11ab94e879ce1f6cb43ce7aac3dfaf4cca962dc07f63c9f1540903891c0d077ee68dbbb3d8ea1ad20d57dfd496d9c4bf9e5f9fe9675aa6bb22a6d8e6664c5e33d29f0c6df5771ccfb8b4bbf92337bfc616425fc42e0a081a9ce27a3e245185f07af19c54839aaf1e0ec12a046cece276b51981036694d20366f2d141dd57171f56506311e6d7b20534f5fab54768bb111b32f63577963f8546805005037812bd43efe2884eb123c5a3576a3d95efc047187e5d5fa9b95ea597a492c47962fdc359d1d4dc371cd05853f4f12944734a3cb62b973002fe9403327640cb01c73622aea9036e6b617e67391d645c40a8698929277cc2a651883d5ab067114231ce416579037b527280ed486e3682e176e49cd3d86673ccb1906f7fe606c121b73f61e390b9ec2d85c779074484031f60dfd460ffac3f801f24885465327cf1b48c4a9dcdff647cdb5cdffc88357fde290d342fe8765c2f7318bab19a0ec010d9208bb4ef08f35111fde718d3b8213eb883c5fc65905b8ded0f9d9c01b098b782c5c5429c640b5019ad1eafe0f7a3a22c3adbf708e958d1192fb7f5386c455e45af3100e7f9ca5214b43593d07419ed9c9259335644a5474a1f649e4468835e2767752d7282c457ede879bf599ac9f0b485b5dd9082f3ec68d3b6e4fa4923b73a3efe09ab967187eefc638134747ae5fe044eee0ea6af497f59f4b2d4a5ed1a656865225308770dee6e05fa4f4e6f013e7784d99af54c98f20810ea5526f7ac705ce0efc04de5e84eba1221d49a782460ebd4b68fe4c04f7eb66d43f6ff3bef232a7e0397f5e01a717c5da3423303a5ac4bb1a6188c36eae177a3b15ceb2e78a9e62eefc4d0f02a4eefdce7a944d2afb015fb11e2af78672b1341e01c5cc42e36376a43a8196935a8bf0cf56be657627c325424d275cb5606d4dfc588c76dfff0600d6af376eecfede8e87cb1318f7d1e1bb57360ac27d46a2f51281e1e987b739d0d5acfbad83fe6682e35b848d570409e2c8eae85f96929f14f7c80ab681117d3dc1630b279cbae7e18acefbf909c724b5a210fd10e07b77432e3e13987f308bb583ed096e5607d350d5c2d024bdcdaac70e38fb2a2206c8405ba8d03c7d20f01d156be772c69794a5c15eb7e7b7ae6ad031c870050e47c41fc8872af9c3f5a839a8dc9fe4031cdd5ef7ab8434fd448ac53a5706aac31a2bec71e0a53853563eda12aa993deb97bcec011e7dfdca55d36b9f74648adb1babe5fb2ee6a7689df12099bdbcedd0e3e941a96742f7c350e0a9869ffe7a9886a21137227e8d80beeb6d0221446f2a6b2e6c157faf89586fd348ff5e15fa661d898aa728b714258ad99d0a47c640d39c2513834e03f4d50ff398962eb2b48c54f84042ff64100583605e0b8e2b9d6030648913064344d944be3cae50f998392fb66635109250dd63ba35c322ada3322cbfd081367fb17248551eebe8385de3f7fe1c341c4a06073344fc9f366540a9018e6335f4546f48c57c4df61e9a253954d202f565f1f25a5b9d4b6bea2f8884fe0efd3210cfd858a43a971a9346947bf8bc298c420a56da53cbddea6bdf7788aafa8a9065c6964c3bce8c74c2ff62cc0b18cb91538df7c5d024e268a453c20ec6bccd0345d569ed775b3d899809c1e4bb49be80185a01e9f6f8c1e306fdff21af4c7c455a52b8e8457a06ce8ae4b31d41e56981e4329614f7d1c1454c6e179f541a58043c75e10f27e98abc343f4cb284d04415481b45d7388698d218c5450e1744c7960064db37c9a9a3ac33ebe1fecd7d60e19f7c2243df4495ebe6bee59717bd3d3148298a21bf1f126ccee42aead422d25263200769ab192bcae795bc5c4a79e177b9a9a10a11150de78795fbd34916862c3faad580c5033db1024637df20365dd1f05ffaba7f10405b69fb1004fb423d3b46a94e08e35abe8523029d9b4f4992eb5d67c723851bd915e696027e51eb553360a244b73c58e4f75b34c6fa61b1d92a483b44a530a055aad8aa6109d2e685542d3e995f95b10419287c0cdec11a416a054d584574bb3219eab0c1194d9bbd5deb93a60e27208cb167c8d04ada2de788ffe1fcece7627136a9d749334a3a1686eae3de7f0048834778220f2f9cc679ab5840de96b8e20c37d1925eccb1297be9148ee59a2336abc4f0a3154c2c3a93e09129d592172844f300e0240320a16565e95c4f14fb5c295a320eb8c70fe8a5205557f5175c43b0597c9b2110548abce0dcc9af256b6f219c1225f62c38d3298c6f83831a3f01b28daa9a7f6695876b6d63413d5e75b5d462080c2d3cc4ccc373bbf81b965e0245a6bd81e694996b7dae36636efb6882bb107b273f030db5204988d0ea09338a4f0292806e1bcd64a63f1b3b969f437b0c3fda612e5f17d018962306973d992dcc9760bdf8059aeba783745b28ab1151a69ef861396b14d82b222482dfe2ddb3944fb0ca95db63a6bf3b16f6a6cc10caca16896be510f0173d5b5c54d156da3ed11b513a06cb795a469205592ad48e7ac61334d1b40d182e6fd63ccd772a14290436a9a3c1563296bb7712283ecc63d86d9162187f781e79a6a1dbcb6b76fe86185e997ec13d9854feee3b9b2f2e9df416c81fc2aa39551b21bc45b70078ce0e1c5487f424c3aa98b4c90991c7635fd4ec984c90319724d3b9b397ed63fc7d8722a24633f7025f971e2793c261c7af89cc2c3b79dd300d7be33658d86e7f10766943a676fa891993e160f45e51af0d713b5148c9608e512a35969e16f516b083d7753bea662aa1550b5e40710e7b9758b2f09afd58474f2cd604ea3c7fadc7eb678c34fbe08a56690b8cc4683a1b3bc1abf08477c4f68c3cd007765b9cd76d6575a3c0ea75b8f6766c6b9af5b36608de57fa985e18c8e6bac44be05d9f9e8fc193b0c3f5eb01a9d58b5a6ae3db9e4aa1da6cfe7aee9c84191eba580f14262fd50f1768ab4bcab335ff9185ba4a6cbf81ce9180a8ae5d0312ff562e1a31e811aa2ce85a7d8e5b62d105364b2a5124af7ad30df79c4050fe3d7846f3df23de8ba3c8ed79709452398939a20fe6025e59a7e154b1fffb07eb04b8737e89d9bd0b5fe349c85c8932bbc95cbfff07fddaef31127c699ca2335c422050e4777890b1c0ffe6ecc830f615bc9799d8db746bcc84e5e08169272bf665c8c7565b086d7dddfe6f718091f2b3ccda0c685937e82f83fbe2b374feed3f77b3945cae726da68ac43e71f292915a337cec430cfbe05279a54f04ef4a8d880f0d8f7132334d94d476b7b79164b2b38d3e39a70809b1f0365f8c12fc61ffd9d5f7afdd49c6b851dff08b3693555142435434b1ffdc25f0faeb98824dbc3ce1f1915ce5561025aa919d1fcb877427b74aa505b058eec062d7bd60b90e8ba789d1a74203c254664eb3b07db1b8f372e7b9b48b6e31ab87b7f9342a05f9e9b2cbdf2b146d7a5d00e472057bd3723d935be9f2f40faeb777b22128030c7296de4edc86a1770080cce80b869a708d604ccb110c29e1abdbd8659d584b771d5f54cace6f2f873bd8f1f2ee272c14796b86c2148c5b8ab723b8f74a0a39e94fb19f6d960233e5d7d9485e99c7a159aefd188020d7a7f2ad5e80dfe2dc0d07d281e3bb90ca1b023823ab6329eee13a6b19ebe2946d4d0180aecba546c411b510d9b3de8992297526b5d19c57c29487f287b869e561bc181765017afdd07402fb8ae28e134bca904ed7498b659dac83f705b2b34e5c2c5298bd1804018c357ee44f5ae27c9685634ff67e81f5878056a410357c142c1226df609f072820aef89f54788b05740d9b8257db5cc6109cd651c39ce8cb70b1ceb8e61c82b304862381cf40a65b40210e4196c821de0983819bcef8af5412d2cbc9242f46bc187d37b1dd5e8a4457ff09048a667b2d8bd2bb0b7098de03717e15899a3298d442d82c0f80578b7a880be563752e18db94d39672816d69c955023ae2b1c87a7116303efbe1595ba070bb1f6b3d0f40dec8c8d538c8979f5329a2f776a4ef30480a704a62960f50aa5bc4a909ee2ca8a3b6369247028c7fb996fa82ad0ee554983a760886dfc72f1c79be6b8a850b8c3f3b4166948de5160bff8ed78b2e29c330b5a29bcd848ec2c0ddce5e85e551ed7ab943c6e39602e721b53d8d6c00e6b4e0819a7db8a3e90a74c4095bec98b27ff8b456424df097bce03a260d77a747d5485f93ea928ea58d79275507dfdd90ad1fd2d00d98a9878b4b60f079fd01f9a0de3fc3920c4257ca57961695202f72e3f73ac9362b23c4183ed0c530b58c4160b05891cba5be3c780917dff9728a7fa49e4f154b69a3dc407e6e97b99cda274f40dea0452c51cf49f06bcc02bbaf9ad4000c87bd9e48ad6b67ca5267fa43a2ad98293fe6358c92660e83b1decf6897dd57751eeab6e95824dc06e67cccc1e577b3dd9f8543e66f2382ec7cd25cf56d7e1c3a9325069e5fe707c46b6bca0a64ed684c4313e7774875e02602c7fb369153b212f00eb4b867232f0edf4f0d508a97b18c6e54a096758c7a4a2a63433e9c3e7774098c05700cce6c31dc21c0ee12b04f6cb651cc307faa07abca75e4c132ad73f4e38bf04541f3eaa57aeec4f7e192395451b45df28c0321d0c340707b82ee285f9567a242bf6cf769bdf5f6c0379b03a532698ba3afca8c4c6b488790e908714d2fe38f41a607e8bae697e08f0c32a92573971aaa4937819f7dd95065fc0559c35f3c132501235cc3369627eaf557ed7e43389bfcd3f2c266d357f161bfd0396be54b56ce6b95d78d983a7801016b2030a12d6a0d74d3ace8eb49f2fad9c10b86731106b150397984275e832470df954c788f0760f90058c3e3d6a9d94a43b531227bdc7f179c9f821d796bea66da5e235c53a4c309117ff4b7e83d39f92e4de81eb5562c162f2375cdd87228933578ee7d8f6bcca029472b9c67a7cc7a51eb90d34bdfb1468aaa968255a30e846363168fb00f7e0702d1b804ffd416e45c4b7d1b344b60daadb85e5e304057306270c2dc4e0b8b4d333101c5a98da83f2f4f59e8805a22608f05b359e2f0cf6631670438c17135cf202f3ec2c575703d2b0579330b41a135959772187ada4905da451c556c7e6bf058ba735857c59acded92b7b56e5c601411c2879788e332c17029ca378a09934674adb6870bc4f8a69fbb357b0ad1464ef34244a18824194a1a9faccca063d6fa41a44687e20e1df971eb1c0916d8b5cb60caab2add1a4c87e36cf51758086ee5251f5061ede102c7be507c0d123cfce7e618657183aa23b0ad0bec6d629cc650991c9f4729cde0a7af6f0c14832dcbb4a8edb39666710cb9e39e2fa4bbc2272727b0ad5d7d8c356237765324436977a13710b00712505fae96e8bad2bbcbc0ec54f7e3c2a16edd95a8d7794ee1bf185ab9640d228697a059", 0x1000}], 0x100011, &(0x7f0000001580)={[{@numtail}, {@nonumtail}, {@shortname_win95}, {@shortname_winnt}, {@shortname_win95}, {@shortname_lower}], [{@context={'context', 0x3d, 'system_u'}}, {@smackfsroot={'smackfsroot', 0x3d, '$'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}]}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r1) clone3(&(0x7f0000000140)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 17:07:20 executing program 2: mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:07:20 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 17:07:20 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:07:20 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, 0x0, 0x183200) dup3(r0, r1, 0x0) 17:07:20 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(0x0, 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:07:20 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000140)='\x00', 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, &(0x7f0000000040)) ftruncate(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed4100000008", 0x6, 0x20fc}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="28d0a5865f91e69933a151c11e47a054af5c5c27b5261ab0628bd5934edcbbca4dbd739610bf4d90472e537d236792e3130ca6b4c0a0a4735b54903ad43e4a6ab5d62f222e146828b21c"]) 17:07:20 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, 0x0, 0x183200) dup3(r0, r1, 0x0) 17:07:20 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 17:07:20 executing program 2: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:07:20 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) acct(&(0x7f00000000c0)='./file0\x00') 17:07:20 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:07:20 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, 0x0, 0x183200) dup3(r0, r1, 0x0) 17:07:20 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 17:07:20 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) acct(&(0x7f00000000c0)='./file0\x00') 17:07:20 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(0x0, 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:07:20 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0, 0x2010, r0, 0x97c43000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r1) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$INCFS_IOC_CREATE_FILE(r1, 0xc058671e, &(0x7f0000000240)={{'\x00', 0x2}, {0x100000001}, 0x118, 0x0, 0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000340)="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", 0x1f4, 0x0, &(0x7f0000000940)={0x2, 0x200d, {0x1, 0xc, 0x1000, "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", 0x1000, "613e302d311a7eb69e224a132f556af90707fe5b76e508af097c11e319da619d5c103427b8f925892c21b020643687c32793404c780be76b49a1660349423fe53b432e49a8fad6fa378d2608a3f887c00a9053cc2817f0773e10f69803e9ebcfbe3747056250d9eafad16fd61d2dccf9a699181c7d684945c46ef4b73a0baaa5e890b1b9b65732cafc7d0d7e4e769e1be68125a2ac07dd553ba45a752dba4bad730078b5bf715eac44fde5ca8c66cac1d4ec7c084ab57d0434ae40f9c6432368c693138d7c21effda9e39253ab1ee8bc2d509ae49dc7962ae9f12add954ee78432e35789a16a8e453260209495f098b3d2428b9a1b8f41f19fba6a20a9a096b863e070e8268716075612a04000b54866bb154b2649d11f6138818131228bf0daa0394b902aaffbcba75928807ad3d4238c10776b82d1388ae0167d192dcda7ddeb4985e24e049a06b0172e60a84153d3fd1a6f16725bdffef8fe9be690402680be685261579c098887e8f69b24235754a51ba473a7fca372bd3a666b335f310052a5c96ba0223ef07cabd8bcba2a34edf77a7a14db54ad80bfd3ec5ade3cda6acd458455397f58f279dbabb3cc7e0021fe616dbfef4005387552caecfd92d148c9d1ab078050249112ab12bdd0f115415d67ae09a87d85c9b45bfacc4cda23cd1d856a647fa68c31f462d010bec8ef84d771b846309a084a22e5e69b486f917aae844039b0dacd0453166fd9b652f9fdcf691bb95bce7a37e9cce38296ced7283a65a2897c9099f9164abe19233269bd02fde04104c21fac49e6b922cfa135063927c9bd083a632730ccbf8d957a385f8457ba303d68b201096d4e709433b6b5122d48a130f1127e204212cb3bfb3a2e87bdc4c946604c120598cc0f7686c0b365da425c6ccd86d0946e5bcba2bb23589493f14276878e8891e3af22fff90f6f3125c4220fb14fe40ee5dc905366fce4fb2011ad6c29f796037074ae9cb74ebe584667d010c92a000ae529e81ac98c77e1e2ed2970ca95e80006624dc97a97fed20f216461da488146c1d94842ebf5094e4227176b5cfcc7d54ed8fecb0a756285502677b78f474c4808b07301123166662a8d8aef2ede01b29410361ddababf90e3f698da4acb241b7b208ea07f8a0479d44a405013bb82eb412854670ab69ba15a8781ab9308520c6a7b4f1368540849c5c1e54c492b02e29bec692d2c339c3ff53fe1b753700813a9ad4e26dd9971ca5e53927250524affa27335572cd5da67d24def78412bf46c2d1846e34aa94dc3dd46c52da55866e71187899849980fa219753f46118e3ea0c043576352cd0c8aa13c367eeeb047e3aacc6cd17ae6bb4c4e81694a75b27e7ff90b99d2f30cf3dafdba0fcdb43be83b70515d484bcadf1cab4d8d4baeba1294d8c31c77fd678e784c24fdb80e5b0855331cb8841d55c24ed3976197c44f75a38001a47ccb2b74c4f21016b8bdc8bd9f12f5ad06d35bfa3712310edb13bff0adc551e028321b18273fec9e165f147f7f15476c68c34ca889e339c9e7dd44b0e4bb51e61c568e8e0d59a0b71bb3de2b37f305c4bfa5e2038d89fe72bf1a4d7f195275a3bb262a02055baf9aaf328b59d5f62b441cfd05d4d76de8d0220c496994bebb9667c0ead7d8471352b198ee75db264fe8e81951e3758d9b4eff91cd8933a69e1d03d0a91d665c49b3a8f91298acee30d78a1908df3ad2436d28906cd189f67507670ba86d781117c8ca9788b7174c09822093a772cd1d5a26dc5385d056973bf3186ba45e720eedc315da374cf543fac216866c99b43c6f33ae07f36aee31c46f1e810150e26080048a8e5b52e5182f9d5bcb8984bb2bc321dfe2bed2a2c8fa0f76924b3cdc253ba1d870fcbff710121b5abf30ed2748a44d795ee15b40595e8a575ecc9beab1fba526e3a519febcb91cf092b913de34d1584763ff2633e76607d6f00b482e1a14eda09d1c00132989927d76e6bbe5fbf389e57a57a7d5f585cbc4a7017fa821ae39e3de8e34aabc1323a11d5c8b325fc8bfe5baebfbdf567563513d219ba83772e7982b93af242010cb49376ce813a53d0107180126415a3d57b5248bd33d8e64b5bd7adb6c73fd2bcd343de51040c500900af68bf5e43093eccdc9e16a4f14e388cc35ba6ce1dd20d43db17b4678e84d34d4a418d70c389b5e15e393f73af073ed225e4fd714ba9e95ea043c4e9e64cacb7a3d0ddb4bf1b2029168bf6482753b90d51bcbfa43f325425b417168e72ab3865093829197ba2c8a18c24ea9394b455c5cd466378e5d11e2a7ad201b6e821292697559499a006136e71c077e06ef4a8a150f219f3828946cda31eb435a5f29ef005f8ec9c56509b1c5998f0dfad29909e9f9fad6bc1d62ee8f104f8b62e1eb9516288e73f0fca3307a30ac6ae5d216e472c4e522efe41a35083340ae24a6a93102e5aaac029ac3ccf274397144c240ec349372d61d6d9f5954bbf86240265e87c207e4702b2f94938d1e15bd575418b228f86b661b34197b051eac56f8ea62e31999beee1380fa24a4e6cee1a3c19bf62de73cc5c63d1026771dc2cec97d5d9b7e8f30d9cd8ac206a09372b45fb62c956202f424275473d29638da8d81dc9b18e45beb21927fe73eae009fe476d5edc96088df78d5927c4210845b03e5a87ff4644f3f546852cd2f64a9fe037cef879d20c5c73f61ca9ebc0171a0c2a9ca10296cd4e2c36733370bff266ec86896010160fc1f85d9d8806371f686b6569e1f1368cb553b2f1ba8ba4c5bac3a3d5d861179bb418d2faa1894c334448b9eb72a5e4872ea180a55ecf125137c6ec939934acf1ee6bed68b2d4143d92f1f6d384c26678b3a48cca2396301563aa184ef5f4266503c8e2d3f5336b1eaa9471d2013fe6c13f44abd91976ab827b9558d6bd2fa0ead49e30e244c445c11cee287e0c3a30e2e0d7e200394c54a03f0005c2e331b1659fca3d6f957f64486a3b27a6046368bedf8d955bb41419c77a329a16465684d9fc8cdffb25324ef294717ccc40ac26e7960ebb070f09126a47c96f35996a253b427530f07e8b734a0f79c6747ba01db2da0133113cd3024c1d62237e55ae64537ce26b78d75934c718e56f21c1d5294e38eb73f06629826c09fc0029cfb7ce7cf02e39840fd50676c771abd50eff086d304dc8e90e000b0cab24a7ae941406d691122409fc2c7231056d7cef22994aa5ee8ab23df3df2dbd2e62af10741361f6162f7662e91c87451e19d826f85756af4c32c8ad06fcd665d548f1a340586c25136e32fd8c69f9ef9d6defb379dd4e0b9594b7ed1f03eb8958313a4c8cdf83681052aecbf5de88043653126bab6f522faca28d36b8ce5155944fb0692126f2ff754130d6e36475f49ce9b1403487e010c8ddb4dfad7f80abd0bead968ba37aaaa3f2628c09668afe972451451f41431838df4ded10e884ba755575394dc1d04cf52c868a5e66368ff4e58ffd3fd3f41305960a69ecc2493ec55052ce0e57edb735b6349bc49731d82c38569829060cb27236b36657061f96570f40a44ed10b54e1365a72d4de272518c5c148b12ae15502d795578abc2ed91d8bf6dd0f38991c9e3c283a343aee861883dc9101aaa01749d91120ee8dd24208b1efb0980ff30ac82f3d6a3653302aae8f34645924df8ac6a41391cc9ebb31a679f188f816cf3c6772fd7ab133317e8b4f04bf1ee348471c9d1cd26235e3ebbe4e92085fd1c465e88f76726a13dd0bea0611c1a907f82244112a4a5d8ef6f199e5c07e6fe562b4bf09bff993e330ad99f93cb9d0bc966b7295f29bc86e16b9fe9cf74476c0a6e2e2764ed35c7520eef59d0b799cb670bfca9a883a9e682da0c28efbd643b4ade09fd5813f9c2bb4eda0422ca36a353f73c5f0cd33a4e6f179919b7deff24e414f37a33731e1ca502f002d83bc546c83e56614579745d72a44974c3416f7157e6e376e407cb0cf7337ce8cbdb8a22886d1f8023c8e53c696e88228bd9c48c0279045835d2105e504a9c3b496eebfa07d234881084b7a415fdb5f562dc888600b60acfabe0fbe3edfc09f2359241232bcbdb729b0f149dee05fe12a6f88d270e96e66830ff5eee97af1f586759a6fb67110a8a13c8d7f4079a254eba9521a053d1b90771ea6a4576e845f89993a4bbdf0f85966e6df0d8f7c98dec445c9895424a6be2151f86a50725d1d110892b3d8e043956fad07a1bddab52eb6062ca08fb5e5f10b616b9f146cba9a83cf305e33d566ce54b52ebf2cc795ac5dd8a856d4dfe376288cd69a2fd588adf2d08d2145667a2e7580481a7684c5748556c17e24b98911ec9ea5fd7c671f2a173963eafb3883f441c82d3f0a0e4898214abc108fefcc982c9df125859ec320d8b0d6a2558299d6f8f9a437257b5ba90468d5cfbaf56e69a2f3dd29a166689110aedef369b50e38425248bbdd07fd5c9600686cbb5f4ae9ef63e52c286508e3bdcb71237298333777b3ee83b13b83b3e5371daa52b1393fd61b62d0af6b282189400286e99ff3bfa418db456f8914fe510291411aea687b56d198123f0e07e7e37354acd19b3143daf3c42e5e3c209bbf296864784ec8d31be2171b7eb9c4cb4077af34a8b1fa071b45ceea960606905af23f25b0e884707e5e5911ffca518ee907b964ed30527978c45534b0e9d4259547575dd83858f06d58eccd3b657a62700ef387fed484139a273d1e2b2d29ae25ed8d2898dbd86985816458f3f7be8ab4c4a4e14003a5bd555042e8270f305e9eb8b324e3a4ba4d0e2aeb7e87448b792cb0bd4253a06b72b13a39a443e5fdb4d53795f471c7fc6c88cf03083f14d67a0a4eb290e38d475d267db7bbc310e721a15a04415b02ddc694a8b9c3886aff384ac3e6be1775f9ca482195a4308aba7e5f51c862825a3cee6db3d70a15302848577524c40dc8a1822c582b66f29eff32476c45d5963ff1c443c0d2ada94031a71149891ee598e77a0f99615795110ea0749281a461b4527125c1fa16591a559039953ded26b941fb575d5be88e98a925d4a2811d9993fe73db613ea5b70df6e53e37fb304e2bddb8ad64fa9a97f0842078acaf733dd4d58f84f5c6418ad5b7ad7d663bb0fe0faa3d1eb430912089940c636d1b89c13389de3a2bfa72bdafad232f2bea089b6dc33fdd463561f35cc900dffe2ee1fbdcb258116737b61b630014ee4922813cf5cc4e34b60e1d0677acf7b4c65f4270b02563eb27934d5a9641bfe277fc69c3f4e9c6b048dfef4ee403f3a12093a1b375ef9cce154b371aa92bdb1d3e45321780928f30a67fa412029cbe48bfd1d02358b290f6117443cc0b82bcfdc89fc86dc9777978325493e92d0426ee2ee3dbd02ec8bd95727a10c2bd4297e077197b446574068a0107699f7e18b692cae648d78f24a8dcef6f9ae696708ca9394f52b8dae7c9679f9f8ce1e7a9b60e96ac637f06fee9aab48079545ccbd49827e1583537ebf0d543e05c578166129fac8beca98270289b77c6305b82087d041cd208ca13bcf2928f60bb5c91d5427a8679b240e46e3098ba1370c77dcf491fc3862db68ff04c7f4e7552d3350135f27b61bb6d155f41cfa90ef204b50261cc69b7af46166d7ac43e0fca5c8ae4d078a5ace00e8e31e7f1abb76733ca6d30a45e62e7421ef890d707c99f2d185df102b322b6fa03fd2b4e43beaec8e87c96fcfb40c56d6aa5d90ebdcd4764a33d24070209fadb3b801c123205ecfed8654efac4dd0b51c9e910ef2b16aa9b8d3b91e9b8d9abd58143d1ba511b1c99c7b6702bc"}, 0xee, "401891150f0f8466239d5c8c7f8ef0ed592aa9f3b9a3a4d38dd239ebaff97b5820c56810e730c1c259a52fd307729dc530c97a911b2cf5a4966bd11afa7dd99a2a5eb7dc775f75054c8f4a7ed1f952a6bacb8878863d13527b95377037a65b6b7de1ead0b959354ab715b9e47f5bf46b4029c0f7542359ff0288ae27e9c2e2c5fcb07427df5f03a3f7b98c165cee7e378d2dff4a7a6cea0cd6a09be140c62be384dd1ce0f3e370dbac3fcdb3d2ed3306ec3f47719f81ebde4f23d2d4c3a35346fbcc64221d14c50b52665e0316d5c3dc17582de9100a1fb17dda6631fac036bcdefb5024054f21144c102dc067f8"}, 0x2107}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 17:07:20 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:07:20 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r0, r1, 0x0) 17:07:37 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(0x0, 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:07:37 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:07:37 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x0, 0x20}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000380)='/sys/fs/cgroup', 0x129000, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) r1 = open(&(0x7f00000001c0)='./file1\x00', 0x88000, 0x80) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[@ANYRES16=r0], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') openat(r1, &(0x7f0000000340)='./file0/file0\x00', 0x101700, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r2 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) io_uring_enter(r2, 0x58ab, 0x0, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_origin(r2, &(0x7f00000003c0), &(0x7f0000000180), 0x2, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x5}) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) openat$hpet(0xffffffffffffff9c, 0x0, 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0xffffffff, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)) 17:07:37 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000140)='\x00', 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, &(0x7f0000000040)) ftruncate(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed4100000008", 0x6, 0x20fc}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="28d0a5865f91e69933a151c11e47a054af5c5c27b5261ab0628bd5934edcbbca4dbd739610bf4d90472e537d236792e3130ca6b4c0a0a4735b54903ad43e4a6ab5d62f222e146828b21c"]) 17:07:37 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) acct(&(0x7f00000000c0)='./file0\x00') 17:07:37 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(0xffffffffffffffff, r0, 0x0) 17:07:37 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240), 0xfeffffff00000000) 17:07:37 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100)}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000140)='\x00', 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, &(0x7f0000000040)) ftruncate(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed4100000008", 0x6, 0x20fc}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="28d0a5865f91e69933a151c11e47a054af5c5c27b5261ab0628bd5934edcbbca4dbd739610bf4d90472e537d236792e3130ca6b4c0a0a4735b54903ad43e4a6ab5d62f222e146828b21c"]) 17:07:37 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(0xffffffffffffffff, r0, 0x0) 17:07:37 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) acct(&(0x7f00000000c0)='./file0\x00') [ 2703.493951] EXT4-fs (loop0): Unrecognized mount option "(Ð¥†_‘æ™3¡QÁG T¯\\'µ&°b‹Õ“NÜ»ÊM½s–¿MG.S}#g’ã ¦´À ¤s[T:Ô>JjµÖ/".h(²" or missing value 17:07:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x1, 0xc1, 0x8, 0xe4, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x97}, 0x10, 0x1, 0x101, 0x2, 0x5, 0x7, 0x7f, 0x0, 0x10000, 0x0, 0x1f}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xa) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') r2 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f000000a880)=@IORING_OP_FSYNC={0x3, 0x1, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r2}}, 0xffff) recvmmsg$unix(r1, &(0x7f0000008cc0)=[{{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)=""/127, 0x7f}, {&(0x7f0000000400)=""/188, 0xbc}, {&(0x7f00000004c0)=""/215, 0xd7}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f00000005c0)}, {&(0x7f0000000680)=""/132, 0x84}, {&(0x7f0000000600)=""/32, 0x20}], 0x7, &(0x7f00000007c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x128}}, {{&(0x7f0000000900)=@abs, 0x6e, &(0x7f0000000b80)=[{&(0x7f0000000980)=""/92, 0x5c}, {&(0x7f0000000a00)=""/162, 0xa2}, {&(0x7f0000000ac0)=""/42, 0x2a}, {&(0x7f0000002a00)=""/4096, 0x1000}, {&(0x7f000000a9c0)=""/4096, 0x1000}, {&(0x7f0000000b00)=""/98, 0x62}], 0x6, &(0x7f0000000c00)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}}, {{&(0x7f0000000cc0)=@abs, 0x6e, &(0x7f0000000f40)=[{&(0x7f0000000d40)=""/16, 0x10}, {&(0x7f0000000d80)=""/152, 0x98}, {&(0x7f0000000e40)=""/139, 0x8b}, {&(0x7f0000000f00)=""/31, 0x1f}], 0x4, &(0x7f0000000f80)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}], 0x128}}, {{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000010c0)=""/153, 0x99}, {&(0x7f0000001180)=""/35, 0x23}, {&(0x7f00000011c0)=""/239, 0xef}, {&(0x7f0000004a00)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/103, 0x67}, {&(0x7f0000001440)=""/113, 0x71}, {&(0x7f00000014c0)=""/56, 0x38}, {&(0x7f0000002540)=""/51, 0x33}], 0x8, &(0x7f0000002600)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x98}}, {{&(0x7f00000026c0), 0x6e, &(0x7f0000002880)=[{&(0x7f0000002740)=""/126, 0x7e}, {&(0x7f00000027c0)=""/94, 0x5e}, {&(0x7f0000002840)=""/64, 0x40}], 0x3, &(0x7f0000005a00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}}, {{&(0x7f0000005a80), 0x6e, &(0x7f0000006d40)=[{&(0x7f00000028c0)=""/55, 0x37}, {&(0x7f0000005b00)=""/237, 0xed}, {&(0x7f0000005c00)=""/71, 0x47}, {&(0x7f0000005c80)=""/4096, 0x1000}, {&(0x7f0000006c80)=""/178, 0xb2}], 0x5, &(0x7f0000006dc0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000006e00)=@abs, 0x6e, &(0x7f0000006f00)=[{&(0x7f0000006e80)=""/63, 0x3f}, {&(0x7f0000006ec0)=""/26, 0x1a}], 0x2}}, {{&(0x7f0000006f40), 0x6e, &(0x7f0000007180)}}, {{&(0x7f00000071c0), 0x6e, &(0x7f0000008840)=[{&(0x7f0000007240)=""/125, 0x7d}, {&(0x7f00000072c0)=""/130, 0x82}, {&(0x7f0000007380)=""/3, 0x3}, {&(0x7f00000073c0)=""/143, 0x8f}, {&(0x7f0000007480)=""/181, 0xb5}, {&(0x7f0000007540)=""/174, 0xae}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/187, 0xbb}, {&(0x7f00000086c0)=""/117, 0x75}, {&(0x7f0000008740)=""/202, 0xca}], 0xa, &(0x7f0000008900)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd0}}, {{&(0x7f0000008a00), 0x6e, &(0x7f0000008c00)=[{&(0x7f0000008a80)=""/98, 0x62}, {&(0x7f0000008b00)=""/229, 0xe5}], 0x2, &(0x7f0000008c40)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}}], 0xa, 0x140, &(0x7f0000008f40)={0x77359400}) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x81, 0xfb, 0xfc, 0x7, 0x0, 0x8, 0xd0, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x5, 0x6}, 0x2100, 0x2, 0x20, 0x2, 0x1ff, 0x3, 0xcf43, 0x0, 0x4, 0x0, 0x1ff}, r5, 0xd, 0xffffffffffffffff, 0x1) readv(r1, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) lseek(r0, 0x675, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f000000a500)={{{@in=@private, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f000000a600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f000000a640)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f000000a740)=0xe8) r10 = getpgrp(0x0) pidfd_open(r10, 0x0) r11 = openat(r4, &(0x7f000000a980)='./file0\x00', 0x202000, 0x88) perf_event_open(&(0x7f000000a900)={0x1, 0x80, 0x7f, 0x3, 0x7, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x20, 0x3, @perf_bp={&(0x7f000000a8c0), 0xd}, 0x100, 0xfffe, 0x40, 0x9, 0x7f, 0x20, 0x4, 0x0, 0x10001, 0x0, 0xad72}, r10, 0x10, r11, 0x1) syz_mount_image$ext4(&(0x7f00000005c0)='ext4\x00', &(0x7f0000008f80)='./file0\x00', 0x4, 0x6, &(0x7f000000a440)=[{&(0x7f0000008fc0)="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", 0x1000, 0xffffffff}, {&(0x7f0000009fc0)="549c8e929b00117c303cd097b8fa87fe6daad97f11625fa4c195b3d16a8d373beedc09d30ac60d0b81ee7b9c81273f08622f6c1a700c75acd85794c6ef1de9063245b74b4f0888ec0d107fce2eb999f37b0c970f598dd6bd02865c3fd6d29f85b7d3717b067eec3f5e1719c62c86e45a37e263120e956668ce74abe08387ef679fc0eab9636cc795679e69e3d434facc9cd8796bb1d9a1b6557b7e5d2255c0ddcdece8ff87e942fa148f3a359257d044777ff9af80925301e5df2d651d357eef8428ded7d8e313aa1677ed4b3a", 0xcd, 0x401}, {&(0x7f000000a0c0)="e40b4060eb05f207a8c60f09172bac23dc8311969b35f2fbd9b49edc36f682836e1a63768b0ee793eff743b316056dc4cac9be18b389ed521a3bb5f2649988b6c2b2f5bc2ec472f0ed8fcb54aea779f3cb9514463e71d2c11c2f4a134f38b9453ece48531fd31a9698452f7d798e90c458fe37c1f0db46ec47bd700d8d230b504ee0e34ad0be6d18216c5d5af1921bce8a46434690c08f8996642b5a135732c921c83a3e4c3e32323ee32d5989754b0de93f7066ef8fcbf501e29f69e4619cec56b5246f6b6b8c2f2060faf081ba39904f9347cfd474", 0xd6, 0xc6c2}, {&(0x7f000000a1c0)="7240c91b2a42df614df4af1c61ee50a2894c0ecc7dd4798d94c88e724f9a13c835c19403bbd40b6e39fef70d30b5e83e6a173909dbf142f20409330af4841eb7f97c9fde1a84462f1ba9c2d6df8d4c0021dbe6a193678e47586eb962fcbed5555ca98c058e10e016d826512fe9bec46887f13bb7aea0b7cfc49360f0bf4243d8cbcaa81a24be0329f16c95fbb36d3cd6d658a87cf233c6369f4d7f1b2bbc0d83cb65c1a08da78db99b59fe9f29241ccc7e1db4e188b8f5168e1736da02f47b734c", 0xc1, 0x8}, {&(0x7f000000a2c0)="8541342d1d1d40d4a2b7b5dace66723ba0139973f982c1b9c297052ddeadb5fb332756b5346a25d864c6a43d9a2426239c6c9100db47104d521aa40eab47fc731eaa287e4ab701fd1f8a599047b0263a983057c22bf655b871fdf8ef5005c3e12d55b247d6bc61a82fd32a77d7f0cfd70a127862bf0a569f93e596962c31b220c0f1f23392dec718cc88b6d47072558ba69ba3725771e04de501084cbec9e57ecc814c913be0d2806cd496d8401413fdd70918f323c0a3cfa9e8dc40aab5487edeceaa8b", 0xc4, 0x3}, {&(0x7f000000a3c0)="dd0d1f97b7c8cda28c7d37db573a4de4b7648622be7953648588ef87d741e3184b8edfc2c96f8ebe9828dfe6cfc23b4c785379a685e2e2c5de54f5bf1087921a68eabb6bf70f98906de7635b0e1cf5d689f464feb86a1e8c2804bedabff08387e174cbf473", 0x65, 0x1}], 0xa2043, &(0x7f000000a780)={[{@min_batch_time={'min_batch_time', 0x3d, 0x2}}], [{@fowner_gt={'fowner>', r6}}, {@subj_user={'subj_user', 0x3d, ']$}:'}}, {@dont_appraise}, {@fowner_eq={'fowner', 0x3d, r8}}, {@subj_user={'subj_user', 0x3d, '\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '.,^!'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@dont_appraise}, {@euid_gt={'euid>', r9}}]}) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r14 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r12, r13, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r14, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002900)=""/158, 0x9e}, 0x0, 0x2203}, 0x0) preadv(r14, &(0x7f0000000000)=[{&(0x7f0000000140)=""/143, 0x8f}, {&(0x7f0000000200)=""/206, 0xce}], 0x2, 0x3, 0x8001) 17:07:37 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:07:37 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0x0, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:07:37 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r2, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002900)=""/158, 0x9e}, 0x0, 0x2203}, 0x0) sendmmsg(r2, &(0x7f0000004700)=[{{&(0x7f0000000140)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e20, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000240)="e44c3db22bac891fa765deca7fe83c15d3df4d216d1e17db1d7abbebe52a629bcc3e35d47c490577e11df396e17eee9df9a5238284981508dff488aaccc0786bc7941305a0366f7a4e218173877d4cab56f96cd604d2b31e61c65d7de9c82215f3c42036f95b2d3946a837721ced75858649", 0x72}, {&(0x7f0000000340)="edcb3c461626c203ae3f0cb1b3c472f422409c286e960d7b445494a54601825347db42a960396cbd9a922c3dd42eafc6988eac49a2293802bcacb0c3edba5c66ee4572360e9428c3e15e2ef3970cb0cc21d187b7aa2fa69a1b6583f30d8610fcf45535c459fabc3da9a33b7fdcbb1f518f17e18813f50988d53b30c5a80c7dae57a8bdeb7d6a7942b26b4ef0144b4659f2c67720cca085e16960177d58244feb841e1b26fc0b2cf52b90615495f6033367f1b01762d77e98d8dd1ad3152bc2f50b1aee98", 0xc4}, {&(0x7f0000000440)="b6c00a181a0ed3f6c5b375cbd623da67b255fb4456cd219a32898d20a53322c97f80671cd8900b359978bdd07a7a0623e9f21a7043c417fe8533d4a355dcfa4f79beb1181251bf29fe9b9bdab0c6533beee997aad8cdb6264228893ca10f26ee5cc1b7083899265960276f574715d2f8f7e2178e8746f3553ecf87f609885e1fea708de2cd56375d9eafb7e3b35576216a163f651c3d", 0x96}, {&(0x7f0000000500)="8c098cbf7bb78f0df2ea7c61ece8dddf304096006b5ad580ce409739ad2271e79374ae94ec93ebec5050ddd4a550c68f32f4417688da63fa2837f0fdab37f697c753ae3956eee8fe43296a8eb7b7089ac1a6b38f53742b47299712cc2df91b44cee73b4a810358fcdb691069531cba1f72f4a441b21ecf624027ee7dbd19276f77e3cdbfeef57a0a74c7e090937f4c47bca93585", 0x94}], 0x4, &(0x7f00000005c0)=[{0xc8, 0x108, 0x7, "53da4b3566ec4d4c8ee7af799894478baab5c04872dbcd685baabd35d343c213a47bcf397120fc67555e3fecd2575cb1a3d75e2382ad6ba96c0e01a4702a2b1445d01da492bcc01af70a52a87cedb16c08cd9e40fb7a0d5ff5142b21edfc4b69ecfdfad9187ad0a923f018e1afb643d52832fa568832d4628790c3636e3b24ba73eaf73ad8176f13fa7e6c685ce90a7640be51be2595a8980013ca8f01b6b5d5a42b4f0ab19e4558562a870a5b0418694e"}, {0x88, 0xff, 0x7, "14c8b3fdf0f76a0c8a10b2d5eb6516ee884d4aaa5caf704e408b8b2e370c2fb976d0ca11c730e021ab2c6181ce8f1802c804721936ef03996073d6e46a8b4438b4e36bd066d7cf3191aff3cd421dead0f228e6e145616a3d22b3ffc42b6661fcda3b8e9f627a428451df299cd88176b9902c99f737df7b9e"}, {0xf8, 0x10c, 0x10000, "ead1480a80ed022dd3c5459f0dd90aa2e8e5c04b24c87caedb8b3bcf6aa60220860f5daa998f7538be770765ea4aeb98e7449dc44d1507646754fcbdce07f2dfcc12ca412045e5f38b6abf29e9bccf639412baffc933cff987a182c45fbe9bb9916c4947afdd0f06367ace6a02ed9f666cb95880c52c1bb585be7368492bf09022f50e8610f90a7befe0280960f1a8e33e86f8d6675f908016839ec311fa35de1f0a445de22c77dc7e15e1d4093c60fd0608a669fb0f2689b8be8dc339bf9b3a6de4295a8749721a0dd519fcefbd7e2d77196722a6bdf71d6454e918ca0e6db4c9"}, {0xa8, 0xa2726fac7b80a498, 0x127e, "5a009406bbf5a220416ac3c6fe33d2b89c10da049f699424ab983dd73c3fabaccec18a1f57cc08229fbec30dc16b51862dbbf6c330f5b11016c83cc23ab468feee8ecb3cd0a61d755ddd9369353d382e0dff3c6214d7356e126eb9c693e8902664a382a370edc3ceb18e60996c649a14e7e3a964305f9186f3eaf192f42a414d7007c15f0b8a4229eb6ffc4aa5ef57ff38095369b3"}], 0x2f0}}, {{0x0, 0x0, &(0x7f0000002bc0)=[{&(0x7f0000000940)="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", 0x1000}, {&(0x7f0000001940)="3b68cc8c93", 0x5}, {&(0x7f0000001980)="cc90eec13b4fc7a2c48b1c453b7218c266ab56208ebd5a5ef8f630baa8c6f90e9097fca066ef023d564245b978a27677043415ef0c5c535b02f1a746f05d45a5da9872f72e624c972adf12700723f24a27a8a19865e8a422e13f001314bbdd152f172c3e8867b5cdb9d17938e4fbb7b5f22e9e4d009bd707561d55f0aa88e0d02a", 0x81}, {&(0x7f0000001a40)="e83cfb3dc7dc10ee16cabe08b46653ef7faf9c71f04d815b6fe1fa9e4f0c2aa0ee0964fba305e2be30501e733b623718f73c2944fe44ef3299bb232604684789009032aa0b9f751ee9175346f4c8cc8711df9befba34f3dd5ef7a9c7c89253d4df59d72328f8b3d8eb7f382a18322b13a4f537e627c5450e9bc78029d04544f7979dd4dac79699f947bb371ac6abb071c75932ea100ffe3fba2e88e86fd3cafd77ca3123950ab3ab888b1dbee727d170147da91a00aa90ab89b71ea0bce8fd2c006e4f31ce10a583fa64d1d0065759fcb8c6e6c227a26ae9fc5d93c7be23220973bdaecef6aa025926038ea216dfd75eca0bfb7ff97ac4e3daefbc5f080ce474b30c2f999d059578e85ffb7f1274c66ad3bfc80a403aa9090f284a8ff17e087e1eb7f43b9babebc032fdbf45df623402561c7028cc8888034bbca1fb3f12622cc450d2a7b1cff99327c64287d84c8d6ebaa9b9204ec235b2f94deace28c899f793fb63e9364545e2fe525c2c777b183e361fd5cc347bd6553d0b773f937b5e1786132d76f24460de383b2646d50c1153c6f888559696659545c7a09de7f6eba809e758c455298806f9bd54fb1c7dc3c7013d62018397a3055fb3e6f844db86f99bdc7b6137bb2fb7cfff811927be5e4ad252748a9a9b9d38145ce59d61f518944b7f68ab4d44e8a65b1520fa721543b1c6cd1ca6c52664ab1f20121f39137f3e4ecd4951c13e333c855167c0931dfbf1d10667318a454c86d52d05d518856bf4cd1f57f2e952aab12c0272723892176d66c3d9d57a9bbf007b0f12ef5c0ba1bc690be929f945c16cfe0372932ade6063c79b5728c406bfa31b07976d5933f276abb6e780fc5fb14c7cb8559e357bb818a6306d5336b8a1b5c4f8f0ac39a11c07489a1a79d2163906a65c7eb2a2cb935653af582bbbe176fa9a5b622bae1c9512e3f8a294f50cb44ead980d9465b37efc87a5d712f94907e6fea2841c8e6f52a221d9608bfa366f8e8597ddff2a6fef2beed3c3a3277cc9cb7f5028525e6cb5f6e7a72c3b213394e4f34c76ac491166e0ed7d6979bb4c83a2d4e4fe8fcd3d12bb7bf8f1b2b179d2ed363ddff9460b8493bbf8e849fb52e9bdf4a4f124a8914afc5f203736412fc847eaa7fe0c2d718123bab4e17e94543ca70fc0c931955a9c8a2b1492d0807df4e60409b229ce346a6bc8658ae3a4be299b5cba627aa00e53136ff634f52e5a7ea7031687aae21f9ec53673c127baa668c074c748461c3df9d7cf9b6b08fe2278d4b2833ed00e6da47323b9c2e7025b1985c34857bec504f757a6255709fab5749dc0dde23b783b8b50bb9c19f1562abfae9b9767365dffaa11f7ea8e0d573f2b05395acffb98a7ae88c1f6a69406d08cad9afcd7717b8886753f1b4ab6e7885b0107a696fd5e70bf7bee70fcc3d186c9daac93e95ea234b970c74542bfa343527d6029e01a0d910414f8ddfa7549547e32a11c3523d5cd04207036591f052b0ab9bc75bd19e207dc1c4fd3abd1d2df68dda4cf455f014605cda323602fc37dfb98bd2fba3c46d90b635848ba58f7e42814061628eb3d4d72b93912b64c21d8faaeecc37af6979cff2419d728be3a7be154d509ec9f304d146ce58d65ab7a655794c3e63981d934ab609ba970e6a3be22f3e4c5739bdbaf2a0e7e0de2bc2dc3c7188836db819d2568bff3fd4e1c10ba5990a5584a3c6e6ab23606a21d165007763b66f0359cb215185141653ec5c5f9f5effe2906099db4aef623dc7079ab40d7320919af793c0ededa25974605975e82f55d69d1451af482a3749104f1d086d57673ba284f11203041159e583c08aa2a501fe4456f8a5f3326ee5869f4abb9e304c97e1c6092c4f8f2f334da819ccef78909e5c81c8597fdc3c37b0ecd0567c35b291b7c8e706826f34b0d9d1b7b4720cf7dbbbe887a5994875b49fa6bd1c9d25f52e6106ff6c1e12db1225cb29f0b95ee52dee72387e2995f44510e69ee03c2cbfbd4151a11b171ce20c70cfaffb60c67558d17cfdc75bed7742d79f16498a426fd96ef41cf461bf37309f0877a565f23d2ebb07c90f038d7b627f27c778f625ca72d022c5c0c30e8a9c8cad8bdb8c8ea03ae3652daacede8ecad6d3de83dcda7733cfa15764127d1b0e5c473d4c5c59b7a61d8757e346685ff7ca141bb0cfb42d240a54a81a5443e408d825b1b8f34700edbf1854ebc32282ca4acb07b33b063abefe0de1638e7f51d95ed70c538667d01a0f097e8193a370d3debc109f8d0fe30a0e3278d4513ec34bf3fe053cf4170ef13791ec22ad8ee398dcc415fcec480f85dd5cc197f6d8c6456be44c050fb737b8709e63cfae152640b4261dda9c4526410f7c92b63fee832f023e04856e0669b41331660167e15f181f6cf77fa4fca9610ca5ea8e8d8161f2f8670d58dadab3d25812c8e41ff55052956115f75044ce74de24818901451afdee62cf758e3376593cd327a707915760e73443d144d8cd13d2f0f86860c88915d9411fb0b30b16de6d7d5c5a14fa6de93a2f1369cdd4ed156e3759ae6f459824d98b2fc149da19a1d7c13b433dc4be15da4d36392ca9a604377a39b660d748d6a6a71a97022ae8db2f87d92c42f0ad28d0e98b09d6a7096b01a2ca6c7f35fcf5443821f8bed2e6801e5fd1b10e8877d39b10f662846b52b17638a3ff26cee8d91c9d5ec891fe4653ecc5f2b4da55ce5ce4a6afda354c5f298e89caa35edd4873f8cde30d533ce372c2d7c602927c26441bd28480cb20a8117cfa47f870ac9238f9c721797cacc85559844b73c6f34601a9b573aa8ecff914d9577ee706fb07761dbf51cf563572ace71692ab1ef59a3bd48d430ba24df0b7baedee4ec3e99dc820972fb4a7ba219e90c0b85445d80b60b4ef8a9a0322e485c27a71ce194c2b0cf1a1c4796c0af3a82d37365d3bdaa8175ca0f415e7144ce9d4ad820e41c8513ab35618b2c7dce499795524f884ffa21faa752af761895eb87c76fbfba96dff09601e25e7639e5d26e2598600d4cf3db7196fe8f1bcec06e0d4b66a3604e29150095cd9e9a9954901c9db147711b9893394145089ceccbd3451ce3981343c2f1d23e10a264205566e230d1b5e56dfb12720196d600d3636e1a53bbc274165c82a32211f78a7da11efb3691cf58754357f0d0fb41db17c3295b21b2c325c8d48a1e5e5ba7361b68879b33d172cfc3d4bcb9c2b99fe147c76822979dcd28992249c69e912b1020c0203f920ef56302301bd352806d4a1412b3e347b4f35d5b7db03c7b2485564b6f53c989b6e81c3699ec06e07a914ce2a7fd1ccaeb037a256d8968a2c2682596d6d89ccfc54999fa929486f07376d9b84e0b79a71cd85b11e058b60ba35de028857bc35d8d100e6175729287377e3bc50b3cb5e3c07e5467cf40742392122cbd69ddeb21009a80ab3087b9d4f85f6935fa9808bf391855e6a903fdabeab52a4b797dccc3afa8c71d154fff6befad0dd4b706800ed698a8443c5055f52022c42e3c6554186fcbaafb949533b2883a3e3fa8b9818675843b4602d421c5bc8561c07d01f6bb4cff6881ada2d5895bfefcfc0d006f37de075fa44a134898f28ed2af7ff4969ff8c6f5ebfd6307eee79edd1ba2d8f0e31195ff2d25c0b7466a1738169a674b27fff06391bb974b93b6cc7256ddbde941772758ccaefbc8fcfd6ff5a40c756e86f49df3d4c82bd23dd27c8c05a252867ab4b28833d7159df9ebbdf27cd23817842c6036dcc7eba6aeb5448f0e70e2a36a796ea4d111448cafcfce3febff8d102949933cffe8450b8464f083718c0628c441e5b605bfdbbd1a5f25dc377f912d5b0ec1674f08a3ab4f5a61cec03600453b826a3ea60eac50e2c965e7f3a6252c186fe3e59b20aee653853cf0849d49b1babccf1ad411952a005123d392d0c45733cde7a0d4d93c1566cd59712c93c31ed9545f422a7280e0e62bbf1f5262f03040edc3745ab6bc14df6ef362361e9a4851616cdd516da18518e6711b7f399d0e81b3690b42841590b388452ffb40f688feeb24b9371cdaf5a63bece8dadd78f1bab346ea2c8968bd829bdeb7bd0c2e0d0b531d37151e8ec96468e39c4d26e1e4956f17b4b84eab681e6736d2042fb57fcc788abcb38c0367cb340c90fe613a6b595395a53ebd182406411cb0e6e81c57fc2dc3b8a98950e7cdec8a865a4928d6ed0ddadf499a45cb309139dd2b42f83949346ad348a7beaf4fac3a8a543cf95ed24b91cbb319a0338860052bf2305c09ec96c44ab5dc95d17966b2fa5a62886ab1543c7b4a5bca692360ba59cd2ad883904c22cd49d8d6e7001cf8a4eba95f86cd821b7d587a72ebd0933894d658e2ff07d99508b1aa0cb2350133229e9b72b2b71c0b6871e7a0530e5224b1c338bb238406efaf0e16a5da4d38e906acfd37b1d4fd53a667d9f16350a538e8f6db4db0cfc213eb343fd200b0116d8e36b1a2cd05d249083579257db00246fe3f2516c5f52a6e44da7906f2d236a04d6c6b7bdd7ebddb1b774ad8971d97a6626dbc4a7be380ab6253398614227636c1bc5c56a24c99209880d45b8db949798f28acd0a28a9f950eb75e383fb7ee83b5af635a7d65aa6a469a344e6d65933c48fb36df63d740f062ddf7a55003569ff02a7f40855380d2c333fae819356aea2386608a4cab970b423a2618e5c9483df1d85e58339252b472d6ec83264261eab8dbecee9a0937c0c28b04cb54b5357b2c3bfc85fa6eebbf31295f915f3771f2b7bfe84c2c6f8736e0790611a1a53225b781878feef16ca6c3894a2b0ca8a7aa1599701b110534407e19e7bad88f10c48a4be60c8d9d93366ea1f153b16fa373a3acd1faf42f72af9a75d6fe3d64221ec538dd3398785e36b1c9f009b97a18659b8e62f479c8a3761238523f7fd30a808140e6ad052f296ad7ebbbf708af012df4ceeb6962f669d035b60f9ebff69de6c6b50a906512a2544e5c62c756a7edc087e565e326f6ef661dd39e9b19a271233aaa35a238b76de52e20f51cac91200786d847d73cb317397c4c84e1b506c0f1446dae377859867654dc80f2497602266834d098a268fc25fc1a949cd3d37cec3ef4d44ac0e69b0374db2c3854b5ba606d5c980672913335740ebe300bc6e96c4c1a4752fe81ab03813b446f35015f8bf3e15a0b203a1439ef9c60322c28a04b95bef9f6e99321b199f98bd38a6cc8a59be32de61367339ce819ada488b3a2c5123f1e84b2103bda2181162a0d9089d3e1fef301b89e670e44c76fca57f2631e1299c514c9761c49deec2ab590240bf3765c8e967dc742149f16bdbca7191d8f64a571b96e343f7206aedb8c4fc23c9b26eccccf869081e62fc76254998c473b2cf3604362e3d10bde68ab36b9b148d491f7f5b085b962d03968a60a3f23c8e1c4e22fe923d6d3afb950a8129bff804f19f13e51c218ee942eb214c0a937fab8d6cc8e4efd4cd242bf30690101660fc5e775d3382201d7fde06c817c3cab55aa8bed9c1d59f264f6696ff6d86675b00df2ada593fe958ced3da75429397e3e5164523a8e9d72ee8610dc1f86748d13582681ad94002153e43d9dc4df88c0e7f4e198682755fe2665c547aa0ddbfaa55a84fa8c4bf339471b542793b7cf3fb64055698ee1f224452b978ef37b72fe9c79b882b4d61afdb79b63c6a60245a1e9953e5d681c3411feb0b691696f2b4b8cc13c359f65e9e1e4dae8dcad19f071e002d403206448e4c632af1fd11ccfb2f2e2c98fe7d90c065ae44430a82a09c431ca1577a4fbe0af2339bbf55f", 0x1000}, {&(0x7f0000002a40)="50bcafaf4b92e08da70865c9ef680838e647042482a363646c3cf1907a6a6797f7829d3bb0b544edb3f0165ecc82a3738a4a701c180cef8fe7061ed6892e0d5cb2", 0x41}, {&(0x7f0000002ac0)="c4d9d0712ce043ed50acdf2666f57aa0e51ded850ce0cabe999da03ba4a78634eadcf69997eba1a479f259f17a514dfbcc6e7b9b24c8bf69d6199442215450799edbb988349b738478b6d4c466f275cc4c8acd9f3dc9569897c9b92fcba922b075ae1c065e35c7f7c11fa3134a3238b2799e693baf5094ee99316e0d4785796b437c8367ade6c96435f222ce109f005bb9527524bb055cfe07baa97a45c200c704d803b0f20bfa1eea280e32d1057b8fa3b050295039d16ee6394f15b7a727a30e21c322c4c34f79b106c8d7d0b5622069bac6", 0xd3}], 0x6, &(0x7f0000002c40)=[{0x18, 0x114, 0x100, "34e54a9c0454e513"}, {0xa8, 0x101, 0x7fff, "58c1948533ec481b4166cd9dc5515f216ec5e0c851d53d76bdb3bce7afa420e531eb00ecac5f7680e7b8f2a735db1a3a93df7e43d59bf37a741582e828c9dc571c0aa67b5968b761c72033ee705299053441e512c4e9edad41ed97f8ce1d7e9d0a6a5cdf2b84d1589f1a5f4b20598d7b70abc2d047f8812ffb5c3e12200a8d6e11e77d36adb76c71b3e5467abfbd1fecee59"}, {0xa8, 0xff, 0x0, "7baacc732e747210ecc82995998ca6ad8bbd3f0f2defb6d7fa5fba9a2c8ea9f7fc48dc8a9aee9a5d27abac89883065beae07c4b3ff77702bdb39abf60490bf4232c2d37a54b9e8dd5255980dea0285529baafae78a655a46af0b47a81053353cedfb17fabbd570b4c6e9909cb35dd68b19f3fa3dc201ec9e4a65b75d93e561ad4de98b1b16ce749a09a292ed2609459d7456ad86af205308"}], 0x168}}, {{&(0x7f0000002dc0)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000003200)=[{&(0x7f0000002e40)="e5dbcc1d91b624cac6d5dcb9f2b5e88d4aeee3b2277ddf2d237e5758b8dbbd70f26f77c5708006c6686afafdc18b5b173b06927a4cf984374dd02c3a57390a48630ceb9f0764e53835", 0x49}, {&(0x7f0000002ec0)="2f128adad7272708b96c8054c116e385df55c472626513aa52a1bcbc4d20af4540f7a72b46d552ba9e62e617734cc98696a8c5b96f06c509dd4ba13cc5fd5b7da3815b0d3d7071dde43b01cecffa5d5859a199a8df3822be2462480c42aae0a99ddf8aab0bab62f49968a454fb7656b057e6912004c0f5ce4870142c38eddf061219a5fd7fe797ee0c2b570d26b4692ccbaba93a3bb3010cde01a20725d011acdb94c7d43c71da57f40d90c30bbd740364c7045e7e4efa9fda4c9972913b563e1c60b0214093aef1928e353764dcce6e12b4496ec13737fff48d4a7df275dd78c77dbb86c2c8acee83233ded750c8ae02fad8b48c49b", 0xf6}, {&(0x7f0000002fc0)="05ec2b6d29ea67cd36b84e1dfe0066141ce7cd61fe880f1239b905333fdf88d0daa06ec414afe8ba213ad7374c52c0ec3f39b58a6a9f4d50ab538757cba7ab59b8c23137cdda44f7416a95006887f404398ab45dd08bc98f8bff91bbf5dce391c9", 0x61}, {&(0x7f0000003040)="8d1a4946b26fbb9a343a4adb06f6e087ed7753d712519b98d3d4f88d260f52e0b8b666dd469c681a647b8ffbd6190b2981c969a000b302242b9321763d9116bb2e781c2c431cd415745ef8116ec0e439e7a38c01947da526910ae842f693e35eb6b85b8dc9214b0e8a96a3af2e81d65f8d5250faf1d164e729244aa4ef65c05057d70c3113a1e7b826ee9492d9", 0x8d}, {&(0x7f0000003100)="db00f98f95f15590645a9a148c68da62ccb9108f4f00946d5642f8b8cb6242370f41f632db809d29ea1b911c39e7ada33eb87bc4fbc703f417f20606af07c4ec1b6c68c478912d46ae11c340f206a11f846861d8abc38f8de945f4a5deef0f026408317d028acda2ec088f58ea72bf6014c6badc1a65d6b9e3fe9550111e44927113fa9e0a25d221addf8cec98c343013733b84a7f3d9770ea8d735a743d839fa93f4c0fa2ff0c6fe06d58db9d13de0984ff6debfc0ef1729608775c780c61101986d1bec5ecfb0d3733", 0xca}], 0x5, &(0x7f0000003280)=[{0xa0, 0x108, 0x400, "85a350e74b8e5ab5660f411fea250c0358de13c45abac33f9365699fef504b7f183176fcfd8c74ba84a3b7da4edc9bba33cc9634e014c8dc88db8e57692ec76bbc4fa7a5507498d6cf1ed794ae7fe368f61c44513df37d8d4e5e56e2fcc131d7dbae1f51704b8a72acca300e6a883b2b17e694512dfa39ca9433e57ffe53f5f29c95e67ddf7badaa64"}, {0x110, 0x29, 0x7, "910a5d38edcbd6683550a8cca2521cab3fb8d3bee923d9f496209916986cce6ff080e258425acd1bd9e15d1f736dcbcc254e4dada08483639e0694621896e72b1da6755079ed378d79380074f7d47292655170af954e8ff8ea8dc9e64e7a9941dff49aee2a62cc842e81863047820f89503b02f0066d6853bd27d85d258213c95f3a2b47101c4456de880489879353b52dcf843b8da834651ca1147cdfa08e6e0712b9baedd7b0e6d4ae6351f9b2443b56191afb6b698a700cfc90bfd153fe463b88af2a50325de8f9dfbd09790ba54bc5289d80d0de48502747e4eb5622809e8412c1a3627eddded1f623ae29c0a9c08349f7d539c423c8d7"}, {0xd0, 0x114, 0x31d, "f4e70ef961de6c02b5725bd3416d7ae4fdb1e8d37a92e7336f5593ed5b117665e8d4bb9915b1099f727e77b46dfdc5aa1e46ad06280c3036aebdd2c66dd216015d2e272d947ea80c3bc51b2ca8d959ab6b391847daec7c862d5d0424b285754f2aa95dc147ace4e4caab5f23870b012401d7aa00a2340fd46fa74c933c3923bfb8e7915598c3ea99dd8807e2d9d4875d2be656ebf7e4f7df6ef0c80cd9083bfa9430730d14ab8456fc077b6823d241bf9576d2d0bc9b857c0c9f"}, {0x1010, 0x10d, 0x8000, "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"}, {0x98, 0x11, 0xda2, "48707ecfff2549be0798814d7027bb96c78f0d43d8da23e3fb894fed3e249f39e8f449a34528d145e6d11c79ccb0dc1a3b5b11d5f4185a1e2f4038a35800e3724c98afe12132881c5be192a94c2b28748d8cba8adca606b6b586711489676d8e51a4ee2dd131292c4e2f895f9f2477d29493b806536b44e0a1ad345c842ee73c030b8192c973"}, {0x100, 0x107, 0x40, "a873b15cfd482c15626f4d55463c4e5913797fb121d9ee2928a945b144432c5f9244a4458f3b12aab74d56d028f6c7b23d1ce42964233ead8830e25c6adb0d95e860acad8d777790e88cc745606962dc7f5901d082d9a880319b4ad408939283a37b3dd3227bfeca98603d763ff19ec24358e7cbb371d14cb4a4055bfc2898c244ee0351cf6d9946080e4f41ca845e4971d2b6c8936fe4d76c1797b12e5a9060b2a0ad1336962269bd9bcc018df3ce1f487a8e4740a761ca7dc49d1654361ce71fecc52808abb481061eb1920fe373511e3f76da2fce644e329ba621c00a19dcd4c96f529b81603143592a7c"}, {0x30, 0x3a, 0x0, "6b7f3840c4652aeb5af81a8d5bdc3fb8d2e5ccf9772202be3e016830f1fb"}], 0x1458}}], 0x3, 0x4) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r3) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 17:07:37 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:07:37 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000140)='\x00', 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, &(0x7f0000000040)) ftruncate(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed4100000008", 0x6, 0x20fc}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="28d0a5865f91e69933a151c11e47a054af5c5c27b5261ab0628bd5934edcbbca4dbd739610bf4d90472e537d236792e3130ca6b4c0a0a4735b54903ad43e4a6ab5d62f222e146828b21c"]) 17:07:37 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) acct(&(0x7f00000000c0)='./file0\x00') 17:07:37 executing program 2: fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)={'L-', 0x3}, 0x16, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') readv(r0, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) syz_open_dev$vcsn(&(0x7f0000000100), 0xffffffff, 0x4000) [ 2703.767846] EXT4-fs (loop0): Unrecognized mount option "(Ð¥†_‘æ™3¡QÁG T¯\\'µ&°b‹Õ“NÜ»ÊM½s–¿MG.S}#g’ã ¦´À ¤s[T:Ô>JjµÖ/".h(²" or missing value 17:07:51 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(0xffffffffffffffff, r0, 0x0) 17:07:51 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:07:51 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x430}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000140)='\x00', 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, &(0x7f0000000040)) ftruncate(r0, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed4100000008", 0x6, 0x20fc}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="28d0a5865f91e69933a151c11e47a054af5c5c27b5261ab0628bd5934edcbbca4dbd739610bf4d90472e537d236792e3130ca6b4c0a0a4735b54903ad43e4a6ab5d62f222e146828b21c"]) 17:07:51 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9bbb) 17:07:51 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0x0, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:07:51 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002900)=""/158, 0x9e}, 0x0, 0x2203}, 0x0) accept(r3, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @empty}}}}, &(0x7f0000000080)=0x80) readv(r0, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 17:07:51 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) acct(&(0x7f00000000c0)='./file0\x00') 17:07:51 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "00000010", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r2 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r2, 0xf50f, 0x0) write$binfmt_elf32(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) r3 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) io_uring_enter(r3, 0x58ab, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0/file0\x00'}) sendfile(r3, r4, 0x0, 0x5) close(r1) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 17:07:51 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r0, 0xffffffffffffffff, 0x0) [ 2717.755098] EXT4-fs (loop0): Unrecognized mount option "(Ð¥†_‘æ™3¡QÁG T¯\\'µ&°b‹Õ“NÜ»ÊM½s–¿MG.S}#g’ã ¦´À ¤s[T:Ô>JjµÖ/".h(²" or missing value 17:08:07 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r0, r1, 0x0) (fail_nth: 1) 17:08:07 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:08:07 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) fallocate(r0, 0x6, 0x80000001, 0x15) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r1) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 17:08:07 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9bbb) 17:08:07 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) acct(&(0x7f00000000c0)='./file0\x00') 17:08:07 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:08:07 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 17:08:07 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0x0, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) [ 2733.403864] FAULT_INJECTION: forcing a failure. [ 2733.403864] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2733.406661] CPU: 1 PID: 34900 Comm: syz-executor.2 Not tainted 5.10.185 #1 [ 2733.408291] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2733.410217] Call Trace: [ 2733.410843] dump_stack+0x107/0x167 [ 2733.411699] should_fail.cold+0x5/0xa [ 2733.412601] _copy_to_user+0x2e/0x180 [ 2733.413492] simple_read_from_buffer+0xcc/0x160 [ 2733.414583] proc_fail_nth_read+0x198/0x230 [ 2733.415609] ? proc_sessionid_read+0x230/0x230 [ 2733.416685] ? security_file_permission+0x24e/0x570 [ 2733.417854] ? perf_trace_initcall_start+0x101/0x380 [ 2733.419055] ? proc_sessionid_read+0x230/0x230 [ 2733.420138] vfs_read+0x228/0x580 [ 2733.420961] ksys_read+0x12d/0x260 [ 2733.421808] ? vfs_write+0xa70/0xa70 [ 2733.422687] ? __secure_computing+0xb4/0x290 [ 2733.423726] do_syscall_64+0x33/0x40 [ 2733.424613] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2733.425820] RIP: 0033:0x7f2d5c1a269c [ 2733.426692] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2733.430994] RSP: 002b:00007f2d59765170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2733.432760] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007f2d5c1a269c [ 2733.434406] RDX: 000000000000000f RSI: 00007f2d597651e0 RDI: 0000000000000005 [ 2733.436064] RBP: 00007f2d597651d0 R08: 0000000000000000 R09: 0000000000000000 [ 2733.437707] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2733.439351] R13: 00007fff09a77eef R14: 00007f2d59765300 R15: 0000000000022000 17:08:07 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) acct(&(0x7f00000000c0)='./file0\x00') [ 2733.500498] audit: type=1326 audit(1687712887.796:70): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34955 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f94b118eb19 code=0x0 17:08:07 executing program 4: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r1, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x9bbb) 17:08:07 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 17:08:07 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9bbb) 17:08:07 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r0, r1, 0x0) 17:08:07 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 17:08:07 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1000, 0xfd, 0x4, 0xe1}, {0x7, 0x1, 0xff}, {0xb, 0x10, 0x6a}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r0, r1, 0x0) 17:08:07 executing program 6: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9bbb) 17:08:08 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r0, r1, 0x0) (fail_nth: 1) [ 2733.784260] FAULT_INJECTION: forcing a failure. [ 2733.784260] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2733.786793] CPU: 1 PID: 35233 Comm: syz-executor.4 Not tainted 5.10.185 #1 [ 2733.788211] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2733.789935] Call Trace: [ 2733.790475] dump_stack+0x107/0x167 [ 2733.791227] should_fail.cold+0x5/0xa [ 2733.792026] _copy_to_user+0x2e/0x180 [ 2733.792806] simple_read_from_buffer+0xcc/0x160 [ 2733.793757] proc_fail_nth_read+0x198/0x230 [ 2733.794639] ? proc_sessionid_read+0x230/0x230 [ 2733.795561] ? security_file_permission+0x24e/0x570 [ 2733.796575] ? perf_trace_initcall_start+0x101/0x380 [ 2733.797603] ? proc_sessionid_read+0x230/0x230 [ 2733.798528] vfs_read+0x228/0x580 [ 2733.799235] ksys_read+0x12d/0x260 [ 2733.799970] ? vfs_write+0xa70/0xa70 [ 2733.800727] ? __secure_computing+0xb4/0x290 [ 2733.801630] do_syscall_64+0x33/0x40 [ 2733.802382] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2733.803417] RIP: 0033:0x7f29ba2b369c [ 2733.804177] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2733.807896] RSP: 002b:00007f29b7876170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2733.809436] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007f29ba2b369c [ 2733.810878] RDX: 000000000000000f RSI: 00007f29b78761e0 RDI: 0000000000000005 [ 2733.812385] RBP: 00007f29b78761d0 R08: 0000000000000000 R09: 0000000000000000 [ 2733.813840] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2733.815281] R13: 00007ffc5e2ef83f R14: 00007f29b7876300 R15: 0000000000022000 17:08:24 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) 17:08:24 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) acct(&(0x7f00000000c0)='./file0\x00') 17:08:24 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:08:24 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x0) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:08:24 executing program 6: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@fat=@debug}]}) (fail_nth: 1) syz_open_procfs(0xffffffffffffffff, 0x0) 17:08:24 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000140)={0x9, &(0x7f00000000c0)=[{0x3a7, 0x40, 0x0, 0x793}, {0x53a6, 0x40, 0x1, 0x7}, {0xaef, 0xff, 0x3f, 0x3}, {0x0, 0x6, 0x3, 0x3}, {0x0, 0x1, 0xb0, 0x1ff}, {0xfffc, 0x26, 0x0, 0x1}, {0x0, 0x1, 0x0, 0x4}, {0x2, 0x1f, 0x2, 0x1}, {0xd5, 0x5, 0x50, 0x9}]}) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x240000, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) [ 2750.575388] FAULT_INJECTION: forcing a failure. [ 2750.575388] name failslab, interval 1, probability 0, space 0, times 0 [ 2750.577828] CPU: 0 PID: 35246 Comm: syz-executor.6 Not tainted 5.10.185 #1 [ 2750.579244] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2750.581027] Call Trace: [ 2750.581575] dump_stack+0x107/0x167 [ 2750.582323] should_fail.cold+0x5/0xa [ 2750.583101] ? __do_sys_memfd_create+0xfb/0x450 [ 2750.584080] should_failslab+0x5/0x20 [ 2750.584850] __kmalloc+0x72/0x390 [ 2750.585566] __do_sys_memfd_create+0xfb/0x450 [ 2750.586482] ? ksys_write+0x1a9/0x260 [ 2750.587261] ? memfd_file_seals_ptr+0x170/0x170 [ 2750.588228] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2750.589305] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2750.590367] do_syscall_64+0x33/0x40 [ 2750.591132] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2750.592192] RIP: 0033:0x7f535f33bb19 [ 2750.592956] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2750.596786] RSP: 002b:00007f535c8b0f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2750.598425] RAX: ffffffffffffffda RBX: 0000000020000a00 RCX: 00007f535f33bb19 [ 2750.599891] RDX: 00007f535c8b1000 RSI: 0000000000000000 RDI: 00007f535f3950fb [ 2750.601375] RBP: 0000000000000000 R08: 00007f535c8b0ff8 R09: ffffffffffffffff [ 2750.602844] R10: 00007f535c8b0ffc R11: 0000000000000246 R12: 0000000020000480 [ 2750.604316] R13: 00000000200004c0 R14: 0000000000000000 R15: 0000000020000ac0 17:08:24 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r0, r1, 0x0) 17:08:24 executing program 3: close(0xffffffffffffffff) pipe(&(0x7f0000000100)={0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xfdef, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) r3 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) io_uring_enter(r3, 0x58ab, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x1bc, 0x13, 0x4, 0x5, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x9}, [@typed={0x8, 0x71, 0x0, 0x0, @ipv4=@local}, @nested={0x18, 0x1a, 0x0, 0x1, [@typed={0x14, 0x90, 0x0, 0x0, @ipv6=@remote}]}, @nested={0x40, 0x60, 0x0, 0x1, [@typed={0x14, 0x22, 0x0, 0x0, @ipv6=@mcast1}, @generic="2e101ba3f6f5324a78b362c74e667fc53e79913d21c5dcde928ba85d230088d8fa701defaa80c8d0"]}, @typed={0x8, 0x13, 0x0, 0x0, @pid=r1}, @typed={0x4, 0x46}, @typed={0x8, 0x16, 0x0, 0x0, @pid=r2}, @nested={0x110, 0x56, 0x0, 0x1, [@typed={0x8, 0x3d, 0x0, 0x0, @fd=r3}, @typed={0x6, 0x2f, 0x0, 0x0, @str='(\x00'}, @typed={0x8, 0x7d, 0x0, 0x0, @u32=0x8}, @typed={0xea, 0x67, 0x0, 0x0, @binary="ef8b40c100c1312f7d514d41c8b06953ea22308b40732cb0160bfbb6d7930cb853c725de9eddb565fcfe188fe3d5641b1bfd68da82c9272b6ee45f7e17a6d370f465b74d595b5ff641822085abc10991cdb784023be6936d86ad340a3795a796337ff3c7caf61e4dfb5b23c467b4345822b5e014b6431ec30e2cffea8de5b28e3b7def70467ed35e6d1a5740fd839784d100ff20687e1e38c066250f0936d5717187baa572ee3d7c066a23a8d5db36ea5a711bf921594a5cc1af6f3b6d38e63d510ce8c159c5ae362ee61a09ec80443f7119c7cdbfe56d7f823d58c412d4ea029f3bcf8052fe"}, @typed={0x8, 0x72, 0x0, 0x0, @uid}]}, @generic="f71c1cb2206f74a45ecc24c62f00787c7dfbfd53e9d9f4", @typed={0x8, 0x8f, 0x0, 0x0, @ipv4=@multicast1}, @typed={0x4, 0x8e}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x44015}, 0x40) unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r4) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2750.643728] audit: type=1326 audit(1687712904.937:71): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35240 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f94b118eb19 code=0x0 17:08:24 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) 17:08:24 executing program 6: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@fat=@debug}]}) (fail_nth: 2) syz_open_procfs(0xffffffffffffffff, 0x0) 17:08:25 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) r3 = dup3(r1, r2, 0x0) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) signalfd4(r1, &(0x7f00000004c0)={[0x10000]}, 0x8, 0x37b852a492aa437f) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r6, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002900)=""/158, 0x9e}, 0x0, 0x2203}, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r3, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, @in_args={0x4}}, './file0\x00'}) syz_io_uring_submit(r4, 0x0, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r7, 0x0, &(0x7f0000000440)={&(0x7f00000000c0)=@isdn, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/136, 0x88}, {&(0x7f0000000300)=""/215, 0xd7}, {&(0x7f0000000200)=""/191, 0xbf}], 0x3}, 0x0, 0x0, 0x1, {0x1}}, 0x4) [ 2750.771314] FAULT_INJECTION: forcing a failure. [ 2750.771314] name failslab, interval 1, probability 0, space 0, times 0 [ 2750.773810] CPU: 0 PID: 35341 Comm: syz-executor.6 Not tainted 5.10.185 #1 [ 2750.775227] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2750.776937] Call Trace: [ 2750.777485] dump_stack+0x107/0x167 [ 2750.778277] should_fail.cold+0x5/0xa [ 2750.779083] ? create_object.isra.0+0x3a/0xa20 [ 2750.780076] should_failslab+0x5/0x20 [ 2750.780887] kmem_cache_alloc+0x5b/0x310 [ 2750.781753] create_object.isra.0+0x3a/0xa20 [ 2750.782685] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2750.783764] __kmalloc+0x16e/0x390 [ 2750.784543] __do_sys_memfd_create+0xfb/0x450 [ 2750.785494] ? ksys_write+0x1a9/0x260 [ 2750.786281] ? memfd_file_seals_ptr+0x170/0x170 [ 2750.787285] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2750.788384] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2750.789453] do_syscall_64+0x33/0x40 [ 2750.790226] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2750.791287] RIP: 0033:0x7f535f33bb19 [ 2750.792073] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2750.795878] RSP: 002b:00007f535c8b0f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2750.797459] RAX: ffffffffffffffda RBX: 0000000020000a00 RCX: 00007f535f33bb19 [ 2750.798931] RDX: 00007f535c8b1000 RSI: 0000000000000000 RDI: 00007f535f3950fb [ 2750.800399] RBP: 0000000000000000 R08: 00007f535c8b0ff8 R09: ffffffffffffffff [ 2750.801860] R10: 00007f535c8b0ffc R11: 0000000000000246 R12: 0000000020000480 [ 2750.803323] R13: 00000000200004c0 R14: 0000000000000000 R15: 0000000020000ac0 17:08:25 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) [ 2750.921026] FAT-fs (loop6): bogus number of reserved sectors [ 2750.922347] FAT-fs (loop6): Can't find a valid FAT filesystem 17:08:25 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x0) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:08:25 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) syz_io_uring_setup(0x12a9, &(0x7f0000000140)={0x0, 0x7d23, 0x0, 0x1, 0x18b, 0x0, r0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000240)=0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000440)=@IORING_OP_STATX={0x15, 0x4, 0x0, 0xffffffffffffff9c, &(0x7f0000000340), &(0x7f0000000280)='./file0/file0\x00', 0x100, 0x4000, 0x1, {0x0, r4}}, 0x80) close(r2) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002900)=""/158, 0x9e}, 0x0, 0x2203}, 0x0) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r8, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002900)=""/158, 0x9e}, 0x0, 0x2203}, 0x0) syz_io_uring_submit(0x0, r7, &(0x7f00000004c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x2, 0x0, 0x0, 0x0, &(0x7f0000000480)={0x0, 0x3938700}, 0x1, 0x1, 0x1}, 0x2) 17:08:25 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, 0xfffffffffffffffe) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000100)={0x6, &(0x7f00000000c0)=[{0x8001, 0x40, 0x2, 0xfff}, {0x8, 0x1, 0x5}, {0x3, 0x1, 0x5, 0x3}, {0xffff, 0x7f, 0x2, 0x7f}, {0x8, 0x1, 0x8, 0x7}, {0x7ff, 0x3, 0xff, 0x7ae0}]}, 0x10) dup3(r0, r1, 0x0) 17:08:25 executing program 6: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@fat=@debug}]}) (fail_nth: 3) syz_open_procfs(0xffffffffffffffff, 0x0) [ 2751.031451] FAULT_INJECTION: forcing a failure. [ 2751.031451] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2751.033887] CPU: 1 PID: 35521 Comm: syz-executor.6 Not tainted 5.10.185 #1 [ 2751.035245] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2751.036878] Call Trace: [ 2751.037404] dump_stack+0x107/0x167 [ 2751.038118] should_fail.cold+0x5/0xa [ 2751.038869] _copy_from_user+0x2e/0x1b0 [ 2751.039656] __do_sys_memfd_create+0x16d/0x450 [ 2751.040573] ? memfd_file_seals_ptr+0x170/0x170 [ 2751.041489] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2751.042518] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2751.043527] do_syscall_64+0x33/0x40 [ 2751.044282] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2751.045292] RIP: 0033:0x7f535f33bb19 [ 2751.046038] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2751.049640] RSP: 002b:00007f535c8b0f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2751.051125] RAX: ffffffffffffffda RBX: 0000000020000a00 RCX: 00007f535f33bb19 [ 2751.052526] RDX: 00007f535c8b1000 RSI: 0000000000000000 RDI: 00007f535f3950fb [ 2751.053924] RBP: 0000000000000000 R08: 00007f535c8b0ff8 R09: ffffffffffffffff [ 2751.055322] R10: 00007f535c8b0ffc R11: 0000000000000246 R12: 0000000020000480 [ 2751.056728] R13: 00000000200004c0 R14: 0000000000000000 R15: 0000000020000ac0 17:08:25 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) 17:08:41 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) r2 = dup3(r0, r1, 0x0) r3 = openat2(r2, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)={0x221020, 0x41, 0x1}, 0x18) r4 = creat(0x0, 0x80) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000200)={0x0}) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r8, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002900)=""/158, 0x9e}, 0x0, 0x2203}, 0x0) ftruncate(r8, 0x30bdd76) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000003c0)={r5, 0x2, 0xffffffffffffffff, 0x7fffffff, 0x80000}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0x40182103, &(0x7f0000000100)={r5, 0x4, r1, 0x4}) 17:08:41 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x0) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) [ 2766.815436] audit: type=1326 audit(1687712921.111:72): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35702 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f94b118eb19 code=0x0 17:08:41 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) acct(&(0x7f00000000c0)='./file0\x00') 17:08:41 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) (fail_nth: 1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:08:41 executing program 6: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@fat=@debug}]}) (fail_nth: 4) syz_open_procfs(0xffffffffffffffff, 0x0) 17:08:41 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:08:41 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x66b0, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) mkdirat(0xffffffffffffffff, &(0x7f00000009c0)='./file0/file0\x00', 0x104) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f00000001c0)=[&(0x7f0000000180)='\x00'], &(0x7f0000000280)=[&(0x7f0000000240)='^\\,$-#\x00'], 0x800) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xd00, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) close(r1) pipe(&(0x7f0000000100)={0xffffffffffffffff}) splice(r2, 0x0, r1, 0x0, 0xfdef, 0x0) execveat(r1, &(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='^\\,$-#\x00', &(0x7f0000000440)='&)*/\x00', &(0x7f0000000480)='^\\,$-#\x00', &(0x7f00000004c0)='^\\,$-#\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='\x00', &(0x7f0000000580)='@\x00'], &(0x7f00000006c0)=[&(0x7f0000000600)='\x00', &(0x7f0000000640)='@', &(0x7f0000000680)='+\x00'], 0x1000) write$binfmt_elf32(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="5416c02c7f40b257028cff7f0000"], 0x31b) close(r0) execveat(r2, &(0x7f0000000700)='./file1\x00', &(0x7f0000000780)=[&(0x7f0000000740)='!&[[$)*\x00'], &(0x7f0000000980)=[&(0x7f00000007c0)='\\{\x00', &(0x7f0000000800)='---\x00', &(0x7f0000000840)='#!.!+\x00', &(0x7f0000000880)='+\x00', &(0x7f0000000940)='\x00'], 0x100) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000008, 0x12, 0xffffffffffffffff, 0x8000000) openat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)={0x400, 0x80, 0x2}, 0x18) 17:08:41 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) r3 = dup3(r1, r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r3) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x1c, r7, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_PMK(r4, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x58, r5, 0x800, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r8}, @void}}, [@NL80211_ATTR_PMKR0_NAME={0x14, 0x102, "b2db78c5833ebff1707cadb87b870c1d"}, @NL80211_ATTR_PMKR0_NAME={0x14, 0x102, "bcc1efc72790ec29b366888a2b9015e2"}, @NL80211_ATTR_PMK={0x14, 0xfe, "b035d3cd5732b44539ad2d95bd0c27ae"}]}, 0x58}, 0x1, 0x0, 0x0, 0x1000}, 0x8014) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) [ 2766.841008] FAULT_INJECTION: forcing a failure. [ 2766.841008] name failslab, interval 1, probability 0, space 0, times 0 [ 2766.842399] CPU: 0 PID: 35714 Comm: syz-executor.6 Not tainted 5.10.185 #1 [ 2766.843187] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2766.844091] Call Trace: [ 2766.844399] dump_stack+0x107/0x167 [ 2766.844793] should_fail.cold+0x5/0xa [ 2766.845209] ? shmem_alloc_inode+0x18/0x40 [ 2766.845670] should_failslab+0x5/0x20 [ 2766.846081] kmem_cache_alloc+0x5b/0x310 [ 2766.846528] ? shmem_destroy_inode+0x70/0x70 [ 2766.847011] shmem_alloc_inode+0x18/0x40 [ 2766.847457] ? shmem_destroy_inode+0x70/0x70 [ 2766.847948] alloc_inode+0x63/0x240 [ 2766.848354] new_inode+0x23/0x250 [ 2766.848731] shmem_get_inode+0x15e/0xbc0 [ 2766.849176] __shmem_file_setup+0xb8/0x320 [ 2766.849637] ? _copy_from_user+0xfb/0x1b0 [ 2766.850094] __do_sys_memfd_create+0x275/0x450 [ 2766.850593] ? memfd_file_seals_ptr+0x170/0x170 [ 2766.851117] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2766.851687] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2766.852263] do_syscall_64+0x33/0x40 [ 2766.852668] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2766.853229] RIP: 0033:0x7f535f33bb19 [ 2766.853640] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2766.855628] RSP: 002b:00007f535c8b0f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2766.856474] RAX: ffffffffffffffda RBX: 0000000020000a00 RCX: 00007f535f33bb19 [ 2766.857251] RDX: 00007f535c8b1000 RSI: 0000000000000000 RDI: 00007f535f3950fb [ 2766.858031] RBP: 0000000000000000 R08: 00007f535c8b0ff8 R09: ffffffffffffffff [ 2766.858802] R10: 00007f535c8b0ffc R11: 0000000000000246 R12: 0000000020000480 [ 2766.859590] R13: 00000000200004c0 R14: 0000000000000000 R15: 0000000020000ac0 [ 2766.863180] FAULT_INJECTION: forcing a failure. [ 2766.863180] name failslab, interval 1, probability 0, space 0, times 0 [ 2766.864564] CPU: 0 PID: 35706 Comm: syz-executor.7 Not tainted 5.10.185 #1 [ 2766.865366] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2766.866340] Call Trace: [ 2766.866630] dump_stack+0x107/0x167 [ 2766.867046] should_fail.cold+0x5/0xa [ 2766.867475] ? getname_flags.part.0+0x50/0x4f0 [ 2766.867980] should_failslab+0x5/0x20 [ 2766.868405] kmem_cache_alloc+0x5b/0x310 [ 2766.868848] getname_flags.part.0+0x50/0x4f0 [ 2766.869341] getname_flags+0x9a/0xe0 [ 2766.869767] __x64_sys_execveat+0xd6/0x140 [ 2766.870251] do_syscall_64+0x33/0x40 [ 2766.870677] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2766.871259] RIP: 0033:0x7fb921773b19 [ 2766.871674] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2766.873781] RSP: 002b:00007fb91ece9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2766.874646] RAX: ffffffffffffffda RBX: 00007fb921886f60 RCX: 00007fb921773b19 [ 2766.875462] RDX: 0000000020000340 RSI: 00000000200001c0 RDI: ffffffffffffffff [ 2766.876268] RBP: 00007fb91ece91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2766.877072] R10: 0000000020000600 R11: 0000000000000246 R12: 0000000000000001 [ 2766.877871] R13: 00007ffc68467fcf R14: 00007fb91ece9300 R15: 0000000000022000 17:08:41 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) r2 = dup3(r0, r1, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs2/binder-control\x00', 0x800, 0x0) close_range(r2, r4, 0x2) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002740), 0xffffffffffffffff) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(r5, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="2080b49c52148038e3000000", @ANYRES16=r6, @ANYBLOB="070000000000000000001100000008000100", @ANYRES32=r8, @ANYBLOB], 0x20}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}, 0x6a, r8}) 17:08:41 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) (fail_nth: 2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:08:41 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000300)={0x0, 0x3, 0x2}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r1, r2, 0x0) 17:08:41 executing program 6: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@fat=@debug}]}) (fail_nth: 5) syz_open_procfs(0xffffffffffffffff, 0x0) [ 2767.001439] FAULT_INJECTION: forcing a failure. [ 2767.001439] name failslab, interval 1, probability 0, space 0, times 0 [ 2767.002811] CPU: 0 PID: 35965 Comm: syz-executor.6 Not tainted 5.10.185 #1 [ 2767.003615] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2767.004587] Call Trace: [ 2767.004895] dump_stack+0x107/0x167 [ 2767.005304] should_fail.cold+0x5/0xa [ 2767.005735] ? create_object.isra.0+0x3a/0xa20 [ 2767.006263] should_failslab+0x5/0x20 [ 2767.006703] kmem_cache_alloc+0x5b/0x310 [ 2767.007176] create_object.isra.0+0x3a/0xa20 [ 2767.007680] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2767.008269] kmem_cache_alloc+0x159/0x310 [ 2767.008748] ? shmem_destroy_inode+0x70/0x70 [ 2767.009255] shmem_alloc_inode+0x18/0x40 [ 2767.009723] ? shmem_destroy_inode+0x70/0x70 [ 2767.010220] alloc_inode+0x63/0x240 [ 2767.010622] new_inode+0x23/0x250 [ 2767.011026] shmem_get_inode+0x15e/0xbc0 [ 2767.011499] __shmem_file_setup+0xb8/0x320 [ 2767.011987] ? _copy_from_user+0xfb/0x1b0 [ 2767.012479] __do_sys_memfd_create+0x275/0x450 [ 2767.013013] ? memfd_file_seals_ptr+0x170/0x170 [ 2767.013562] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2767.014155] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2767.014766] do_syscall_64+0x33/0x40 [ 2767.015187] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2767.015784] RIP: 0033:0x7f535f33bb19 [ 2767.016209] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2767.018339] RSP: 002b:00007f535c8b0f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2767.019193] RAX: ffffffffffffffda RBX: 0000000020000a00 RCX: 00007f535f33bb19 [ 2767.020017] RDX: 00007f535c8b1000 RSI: 0000000000000000 RDI: 00007f535f3950fb [ 2767.020822] RBP: 0000000000000000 R08: 00007f535c8b0ff8 R09: ffffffffffffffff [ 2767.021613] R10: 00007f535c8b0ffc R11: 0000000000000246 R12: 0000000020000480 [ 2767.022401] R13: 00000000200004c0 R14: 0000000000000000 R15: 0000000020000ac0 17:08:41 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r0, r1, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x2, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) [ 2767.052322] FAULT_INJECTION: forcing a failure. [ 2767.052322] name fail_page_alloc, interval 1, probability 0, space 0, times 0 17:08:41 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r1, 0x4, 0x42800) write(r1, &(0x7f0000000080)="1f", 0x1) openat(r1, &(0x7f0000000140)='./file0\x00', 0xa002, 0x40) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2767.055067] CPU: 1 PID: 36024 Comm: syz-executor.7 Not tainted 5.10.185 #1 [ 2767.056584] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2767.058285] Call Trace: [ 2767.058832] dump_stack+0x107/0x167 [ 2767.059566] should_fail.cold+0x5/0xa [ 2767.060342] __alloc_pages_nodemask+0x182/0x600 [ 2767.061277] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2767.062504] ? kmem_cache_alloc+0x301/0x310 [ 2767.063373] alloc_pages_current+0x187/0x280 [ 2767.064267] allocate_slab+0x26f/0x380 [ 2767.065048] ___slab_alloc+0x470/0x700 [ 2767.065835] ? getname_flags.part.0+0x50/0x4f0 [ 2767.066766] ? ksys_write+0x12d/0x260 [ 2767.067548] ? getname_flags.part.0+0x50/0x4f0 [ 2767.068478] ? kmem_cache_alloc+0x301/0x310 [ 2767.069341] ? getname_flags.part.0+0x50/0x4f0 [ 2767.070260] kmem_cache_alloc+0x301/0x310 [ 2767.071105] getname_flags.part.0+0x50/0x4f0 [ 2767.071999] getname_flags+0x9a/0xe0 [ 2767.072756] __x64_sys_execveat+0xd6/0x140 [ 2767.073618] do_syscall_64+0x33/0x40 [ 2767.074370] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2767.075401] RIP: 0033:0x7fb921773b19 [ 2767.076146] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2767.079836] RSP: 002b:00007fb91ece9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2767.081376] RAX: ffffffffffffffda RBX: 00007fb921886f60 RCX: 00007fb921773b19 [ 2767.082805] RDX: 0000000020000340 RSI: 00000000200001c0 RDI: ffffffffffffffff [ 2767.084252] RBP: 00007fb91ece91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2767.085684] R10: 0000000020000600 R11: 0000000000000246 R12: 0000000000000001 [ 2767.087124] R13: 00007ffc68467fcf R14: 00007fb91ece9300 R15: 0000000000022000 17:08:41 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r1, 0x40082102, &(0x7f0000000140)=r2) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r3, r4, 0x0) [ 2767.111603] FAT-fs (loop6): bogus number of reserved sectors [ 2767.112324] FAT-fs (loop6): Can't find a valid FAT filesystem 17:08:41 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) close(r2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000004c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/204, 0xcc}, {&(0x7f0000000300)=""/142, 0x8e}], 0x2, &(0x7f0000000400)=""/174, 0xae}, 0x1ff}], 0x1, 0x0, &(0x7f0000000500)) splice(r3, 0x0, r2, 0x0, 0xfdef, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f0000000180)={0x2, 0x2, 0x1, 0x0, 0x26}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x3, 0x4000, @fd_index=0x3, 0x80000001, &(0x7f00000000c0)="0cccd7aab3619b0d8746659e221da0d8d88789e6518819a6b46cbc4ff1171d1a8837306d53d2949bba17b629a0982faa7b357f0b0081e172f303f06712f7455e6e18fb9c404251dd8ebcc64977e10b33dac9cffa234df4bc01b035a67d095adaacf51572f02c3020e07e649cb4e9ac9255d0784306a0659e40ac376a34ff3a8eeec4304c17b7d5e07df15b980364cebcbeefa2d7e467d7e3ae62eeeecb2a19966b0b3f", 0xa3, 0x2}, 0x0) dup3(r0, r1, 0x0) 17:08:41 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:08:56 executing program 6: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@fat=@debug}]}) (fail_nth: 6) syz_open_procfs(0xffffffffffffffff, 0x0) 17:08:56 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x101402) dup3(r1, r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f0000000140)={0x2, 0x3, 0x7, 0x2, 0x1}) 17:08:56 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) [ 2781.801893] FAULT_INJECTION: forcing a failure. [ 2781.801893] name failslab, interval 1, probability 0, space 0, times 0 [ 2781.804676] CPU: 0 PID: 36460 Comm: syz-executor.6 Not tainted 5.10.185 #1 [ 2781.806205] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2781.807989] Call Trace: [ 2781.808597] dump_stack+0x107/0x167 [ 2781.809392] should_fail.cold+0x5/0xa [ 2781.810222] ? security_inode_alloc+0x34/0x160 [ 2781.811214] should_failslab+0x5/0x20 [ 2781.812040] kmem_cache_alloc+0x5b/0x310 [ 2781.812934] security_inode_alloc+0x34/0x160 [ 2781.813893] inode_init_always+0xa4e/0xd10 [ 2781.814814] ? shmem_destroy_inode+0x70/0x70 [ 2781.815766] alloc_inode+0x84/0x240 [ 2781.816568] new_inode+0x23/0x250 [ 2781.817329] shmem_get_inode+0x15e/0xbc0 [ 2781.818219] __shmem_file_setup+0xb8/0x320 [ 2781.819138] ? _copy_from_user+0xfb/0x1b0 [ 2781.820040] __do_sys_memfd_create+0x275/0x450 [ 2781.821041] ? memfd_file_seals_ptr+0x170/0x170 [ 2781.822055] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2781.823193] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2781.824410] do_syscall_64+0x33/0x40 [ 2781.825214] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2781.826313] RIP: 0033:0x7f535f33bb19 [ 2781.827112] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2781.831059] RSP: 002b:00007f535c8b0f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2781.832717] RAX: ffffffffffffffda RBX: 0000000020000a00 RCX: 00007f535f33bb19 [ 2781.834242] RDX: 00007f535c8b1000 RSI: 0000000000000000 RDI: 00007f535f3950fb [ 2781.835765] RBP: 0000000000000000 R08: 00007f535c8b0ff8 R09: ffffffffffffffff [ 2781.837299] R10: 00007f535c8b0ffc R11: 0000000000000246 R12: 0000000020000480 [ 2781.838824] R13: 00000000200004c0 R14: 0000000000000000 R15: 0000000020000ac0 17:08:56 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) acct(0x0) 17:08:56 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x4, 0x0, 0x10000000, 0x2f8, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) io_uring_enter(r4, 0x58ab, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf32(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x55, 0x78, 0x0, 0x9b, 0x9, 0x3, 0x6, 0xffffff84, 0x153, 0x38, 0x24f, 0x1f, 0x5, 0x20, 0x2, 0x7, 0x5, 0x5}, [{0x70000000, 0x3, 0x81, 0x0, 0x40, 0x40000000, 0xfffff261, 0xffff8001}], "f72279fa25", ['\x00']}, 0x15d) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002900)=""/158, 0x9e}, 0x0, 0x2203}, 0x0) r5 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) io_uring_enter(r5, 0x58ab, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r6, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r6) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 17:08:56 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) (fail_nth: 3) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:08:56 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:08:56 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) ftruncate(r0, 0x80) dup3(r0, r1, 0x0) [ 2781.863529] FAULT_INJECTION: forcing a failure. [ 2781.863529] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2781.866724] CPU: 0 PID: 36466 Comm: syz-executor.7 Not tainted 5.10.185 #1 [ 2781.868166] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2781.869934] Call Trace: [ 2781.870502] dump_stack+0x107/0x167 [ 2781.871276] should_fail.cold+0x5/0xa [ 2781.872084] strncpy_from_user+0x34/0x470 [ 2781.872977] getname_flags.part.0+0x95/0x4f0 [ 2781.873907] getname_flags+0x9a/0xe0 [ 2781.874692] __x64_sys_execveat+0xd6/0x140 [ 2781.875591] do_syscall_64+0x33/0x40 [ 2781.876375] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2781.877478] RIP: 0033:0x7fb921773b19 [ 2781.878264] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2781.882157] RSP: 002b:00007fb91ece9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 2781.883761] RAX: ffffffffffffffda RBX: 00007fb921886f60 RCX: 00007fb921773b19 [ 2781.885275] RDX: 0000000020000340 RSI: 00000000200001c0 RDI: ffffffffffffffff [ 2781.886777] RBP: 00007fb91ece91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2781.888270] R10: 0000000020000600 R11: 0000000000000246 R12: 0000000000000001 [ 2781.889774] R13: 00007ffc68467fcf R14: 00007fb91ece9300 R15: 0000000000022000 17:08:56 executing program 6: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@fat=@debug}]}) (fail_nth: 7) syz_open_procfs(0xffffffffffffffff, 0x0) [ 2781.930366] FAULT_INJECTION: forcing a failure. [ 2781.930366] name failslab, interval 1, probability 0, space 0, times 0 [ 2781.931703] CPU: 1 PID: 36693 Comm: syz-executor.6 Not tainted 5.10.185 #1 [ 2781.932495] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2781.933449] Call Trace: [ 2781.933757] dump_stack+0x107/0x167 [ 2781.934169] should_fail.cold+0x5/0xa [ 2781.934602] ? create_object.isra.0+0x3a/0xa20 [ 2781.935115] should_failslab+0x5/0x20 [ 2781.935548] kmem_cache_alloc+0x5b/0x310 [ 2781.936007] create_object.isra.0+0x3a/0xa20 [ 2781.936515] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2781.937084] kmem_cache_alloc+0x159/0x310 [ 2781.937550] security_inode_alloc+0x34/0x160 [ 2781.938043] inode_init_always+0xa4e/0xd10 [ 2781.938513] ? shmem_destroy_inode+0x70/0x70 [ 2781.939006] alloc_inode+0x84/0x240 [ 2781.939411] new_inode+0x23/0x250 [ 2781.939802] shmem_get_inode+0x15e/0xbc0 [ 2781.940259] __shmem_file_setup+0xb8/0x320 [ 2781.940738] ? _copy_from_user+0xfb/0x1b0 [ 2781.941216] __do_sys_memfd_create+0x275/0x450 [ 2781.941732] ? memfd_file_seals_ptr+0x170/0x170 [ 2781.942253] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2781.942846] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2781.943421] do_syscall_64+0x33/0x40 [ 2781.943838] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2781.944417] RIP: 0033:0x7f535f33bb19 [ 2781.944835] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2781.946873] RSP: 002b:00007f535c8b0f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2781.947729] RAX: ffffffffffffffda RBX: 0000000020000a00 RCX: 00007f535f33bb19 [ 2781.948566] RDX: 00007f535c8b1000 RSI: 0000000000000000 RDI: 00007f535f3950fb [ 2781.949395] RBP: 0000000000000000 R08: 00007f535c8b0ff8 R09: ffffffffffffffff [ 2781.950225] R10: 00007f535c8b0ffc R11: 0000000000000246 R12: 0000000020000480 [ 2781.951053] R13: 00000000200004c0 R14: 0000000000000000 R15: 0000000020000ac0 17:08:56 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000000)={0x200000000000025a, &(0x7f0000000040)}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r0, r1, 0x0) 17:08:56 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, 0x0, 0x0) pwrite64(r1, &(0x7f0000000480)="af", 0x1, 0x1000000) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x8, 0x0, 0x8000) r2 = open_tree(r0, &(0x7f0000000100)='./file0\x00', 0x900) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, &(0x7f0000000140)={0x10000, 0x2, {0x2, 0x0, 0x4, 0x1, 0x40}, 0x4}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) r5 = dup3(r3, r4, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r7, {0x5}}, './file0\x00'}) ioctl$RNDADDTOENTCNT(r8, 0x40045201, &(0x7f0000000280)=0xc0000000) openat(r6, &(0x7f0000000200)='./file0\x00', 0x500, 0x180) 17:08:56 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:08:56 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) acct(0x0) [ 2782.028877] FAT-fs (loop6): bogus number of reserved sectors [ 2782.029527] FAT-fs (loop6): Can't find a valid FAT filesystem 17:08:56 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x0, 0x20}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 17:08:56 executing program 6: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@fat=@debug}]}) (fail_nth: 8) syz_open_procfs(0xffffffffffffffff, 0x0) 17:08:56 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) socket$inet6_udplite(0xa, 0x2, 0x88) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) 17:08:56 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) acct(0x0) 17:08:56 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, 0x0, 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) [ 2782.177424] FAULT_INJECTION: forcing a failure. [ 2782.177424] name failslab, interval 1, probability 0, space 0, times 0 [ 2782.180045] CPU: 0 PID: 37064 Comm: syz-executor.6 Not tainted 5.10.185 #1 [ 2782.181558] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2782.183397] Call Trace: [ 2782.183985] dump_stack+0x107/0x167 [ 2782.184799] should_fail.cold+0x5/0xa [ 2782.185640] ? __d_alloc+0x2a/0x990 [ 2782.186447] should_failslab+0x5/0x20 [ 2782.187278] kmem_cache_alloc+0x5b/0x310 [ 2782.188167] ? trace_hardirqs_on+0x5b/0x180 [ 2782.189135] __d_alloc+0x2a/0x990 [ 2782.189901] d_alloc_pseudo+0x19/0x70 [ 2782.190737] alloc_file_pseudo+0xce/0x250 [ 2782.191641] ? alloc_file+0x5a0/0x5a0 [ 2782.192487] ? shmem_get_inode+0x55c/0xbc0 [ 2782.193422] __shmem_file_setup+0x144/0x320 [ 2782.194367] ? _copy_from_user+0xfb/0x1b0 [ 2782.195276] __do_sys_memfd_create+0x275/0x450 [ 2782.196290] ? memfd_file_seals_ptr+0x170/0x170 [ 2782.197313] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2782.198452] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2782.199585] do_syscall_64+0x33/0x40 [ 2782.200418] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2782.201536] RIP: 0033:0x7f535f33bb19 [ 2782.202345] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2782.206400] RSP: 002b:00007f535c8b0f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2782.208055] RAX: ffffffffffffffda RBX: 0000000020000a00 RCX: 00007f535f33bb19 [ 2782.209619] RDX: 00007f535c8b1000 RSI: 0000000000000000 RDI: 00007f535f3950fb [ 2782.211175] RBP: 0000000000000000 R08: 00007f535c8b0ff8 R09: ffffffffffffffff [ 2782.212747] R10: 00007f535c8b0ffc R11: 0000000000000246 R12: 0000000020000480 [ 2782.214298] R13: 00000000200004c0 R14: 0000000000000000 R15: 0000000020000ac0 17:09:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) r2 = dup3(r0, r1, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs2/binder-control\x00', 0x800, 0x0) close_range(r2, r4, 0x2) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002740), 0xffffffffffffffff) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(r5, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="2080b49c52148038e3000000", @ANYRES16=r6, @ANYBLOB="070000000000000000001100000008000100", @ANYRES32=r8, @ANYBLOB], 0x20}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}, 0x6a, r8}) 17:09:11 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, 0x0, 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:09:11 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x8000000}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000280)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r0, 0x4, 0x42800) r1 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000240)="3275953080a0211f", 0x8) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000140)='./file0/../file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) r3 = open(&(0x7f0000000180)='./file1\x00', 0x450001, 0x0) open_tree(r3, &(0x7f00000001c0)='./file0/../file0\x00', 0x9000) close(r2) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 17:09:11 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:09:11 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000140)={0x7, &(0x7f0000000100)=[{0x722b, 0x8, 0x1}, {0x7, 0x3, 0x9e, 0x3ff}, {0x4, 0x8d, 0x9, 0x704f10c2}, {0x5, 0xff, 0x8, 0x800}, {0x3ff, 0x9, 0x3, 0x99ad}, {0x7, 0x20, 0x1f, 0x5}, {0x1f, 0x3, 0x9, 0x2}]}) fsetxattr$security_selinux(r1, &(0x7f0000000040), &(0x7f0000000180)='system_u:object_r:autofs_device_t:s0\x00', 0x25, 0x0) dup3(r0, r1, 0x0) 17:09:11 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) acct(0x0) 17:09:11 executing program 6: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@fat=@debug}]}) (fail_nth: 9) syz_open_procfs(0xffffffffffffffff, 0x0) [ 2797.527476] FAULT_INJECTION: forcing a failure. [ 2797.527476] name failslab, interval 1, probability 0, space 0, times 0 [ 2797.529956] CPU: 1 PID: 37328 Comm: syz-executor.6 Not tainted 5.10.185 #1 [ 2797.531495] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2797.533153] Call Trace: [ 2797.533677] dump_stack+0x107/0x167 [ 2797.534392] should_fail.cold+0x5/0xa [ 2797.535136] ? create_object.isra.0+0x3a/0xa20 [ 2797.536027] should_failslab+0x5/0x20 [ 2797.536776] kmem_cache_alloc+0x5b/0x310 [ 2797.537575] create_object.isra.0+0x3a/0xa20 [ 2797.538426] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2797.539413] kmem_cache_alloc+0x159/0x310 [ 2797.540250] ? trace_hardirqs_on+0x5b/0x180 [ 2797.541111] __d_alloc+0x2a/0x990 [ 2797.541804] d_alloc_pseudo+0x19/0x70 [ 2797.542579] alloc_file_pseudo+0xce/0x250 [ 2797.543403] ? alloc_file+0x5a0/0x5a0 [ 2797.544151] ? shmem_get_inode+0x55c/0xbc0 [ 2797.545036] __shmem_file_setup+0x144/0x320 [ 2797.545906] ? _copy_from_user+0xfb/0x1b0 [ 2797.546754] __do_sys_memfd_create+0x275/0x450 [ 2797.547681] ? memfd_file_seals_ptr+0x170/0x170 [ 2797.548629] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2797.549693] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2797.550744] do_syscall_64+0x33/0x40 [ 2797.551501] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2797.552534] RIP: 0033:0x7f535f33bb19 [ 2797.553306] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2797.557025] RSP: 002b:00007f535c8b0f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2797.558564] RAX: ffffffffffffffda RBX: 0000000020000a00 RCX: 00007f535f33bb19 [ 2797.560006] RDX: 00007f535c8b1000 RSI: 0000000000000000 RDI: 00007f535f3950fb [ 2797.561463] RBP: 0000000000000000 R08: 00007f535c8b0ff8 R09: ffffffffffffffff [ 2797.562900] R10: 00007f535c8b0ffc R11: 0000000000000246 R12: 0000000020000480 [ 2797.564344] R13: 00000000200004c0 R14: 0000000000000000 R15: 0000000020000ac0 17:09:11 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) socket$inet6_udplite(0xa, 0x2, 0x88) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x1a0) syz_open_dev$loop(&(0x7f0000000040), 0xc176, 0x4a0780) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002900)=""/158, 0x9e}, 0x0, 0x2203}, 0x0) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r6, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002900)=""/158, 0x9e}, 0x0, 0x2203}, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x80040, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r8 = openat$cgroup_devices(r7, &(0x7f00000001c0)='devices.deny\x00', 0x2, 0x0) dup3(r0, r8, 0x0) [ 2797.659369] FAT-fs (loop6): bogus number of reserved sectors [ 2797.660728] FAT-fs (loop6): Can't find a valid FAT filesystem 17:09:11 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, 0x0, 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:09:11 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x02)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:09:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, 0x0, 0x0) pwrite64(r1, &(0x7f0000000480)="af", 0x1, 0x1000000) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x8, 0x0, 0x8000) r2 = open_tree(r0, &(0x7f0000000100)='./file0\x00', 0x900) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, &(0x7f0000000140)={0x10000, 0x2, {0x2, 0x0, 0x4, 0x1, 0x40}, 0x4}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) r5 = dup3(r3, r4, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r7, {0x5}}, './file0\x00'}) ioctl$RNDADDTOENTCNT(r8, 0x40045201, &(0x7f0000000280)=0xc0000000) openat(r6, &(0x7f0000000200)='./file0\x00', 0x500, 0x180) 17:09:12 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x1000}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x101000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000240)) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002900)=""/158, 0x9e}, 0x0, 0x2203}, 0x0) fcntl$F_SET_RW_HINT(r4, 0x40c, &(0x7f00000001c0)=0x2) r5 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r0, r5, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_READ=@pass_buffer={0x16, 0x2, 0x6000, @fd_index=0x2, 0x2, &(0x7f00000000c0)=""/135, 0x87, 0x10, 0x1}, 0x7) 17:09:12 executing program 1: acct(0x0) 17:09:12 executing program 6: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@fat=@debug}]}) (fail_nth: 10) syz_open_procfs(0xffffffffffffffff, 0x0) [ 2797.803428] audit: type=1326 audit(1687712952.099:73): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37589 comm="syz-executor.2" exe="/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f2d5c1efb19 code=0x0 [ 2797.880668] FAULT_INJECTION: forcing a failure. [ 2797.880668] name failslab, interval 1, probability 0, space 0, times 0 [ 2797.883075] CPU: 0 PID: 37777 Comm: syz-executor.6 Not tainted 5.10.185 #1 [ 2797.884518] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2797.886252] Call Trace: [ 2797.886811] dump_stack+0x107/0x167 [ 2797.887574] should_fail.cold+0x5/0xa [ 2797.888364] ? __alloc_file+0x21/0x320 [ 2797.889184] ? __alloc_file+0x21/0x320 [ 2797.889989] should_failslab+0x5/0x20 [ 2797.890776] kmem_cache_alloc+0x5b/0x310 [ 2797.891619] __alloc_file+0x21/0x320 [ 2797.892389] alloc_empty_file+0x6d/0x170 [ 2797.893249] alloc_file+0x5e/0x5a0 [ 2797.893989] alloc_file_pseudo+0x16a/0x250 [ 2797.894861] ? alloc_file+0x5a0/0x5a0 [ 2797.895650] ? shmem_get_inode+0x55c/0xbc0 [ 2797.896530] __shmem_file_setup+0x144/0x320 [ 2797.897428] ? _copy_from_user+0xfb/0x1b0 [ 2797.898287] __do_sys_memfd_create+0x275/0x450 [ 2797.899233] ? memfd_file_seals_ptr+0x170/0x170 [ 2797.900197] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2797.901296] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2797.902365] do_syscall_64+0x33/0x40 [ 2797.903132] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2797.904192] RIP: 0033:0x7f535f33bb19 [ 2797.904975] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2797.908769] RSP: 002b:00007f535c8b0f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2797.910336] RAX: ffffffffffffffda RBX: 0000000020000a00 RCX: 00007f535f33bb19 [ 2797.911803] RDX: 00007f535c8b1000 RSI: 0000000000000000 RDI: 00007f535f3950fb [ 2797.913288] RBP: 0000000000000000 R08: 00007f535c8b0ff8 R09: ffffffffffffffff [ 2797.914759] R10: 00007f535c8b0ffc R11: 0000000000000246 R12: 0000000020000480 [ 2797.916230] R13: 00000000200004c0 R14: 0000000000000000 R15: 0000000020000ac0 17:09:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, 0x0, 0x0) pwrite64(r1, &(0x7f0000000480)="af", 0x1, 0x1000000) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x8, 0x0, 0x8000) r2 = open_tree(r0, &(0x7f0000000100)='./file0\x00', 0x900) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, &(0x7f0000000140)={0x10000, 0x2, {0x2, 0x0, 0x4, 0x1, 0x40}, 0x4}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) r5 = dup3(r3, r4, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r7, {0x5}}, './file0\x00'}) ioctl$RNDADDTOENTCNT(r8, 0x40045201, &(0x7f0000000280)=0xc0000000) openat(r6, &(0x7f0000000200)='./file0\x00', 0x500, 0x180) 17:09:12 executing program 1: acct(0x0) 17:09:12 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x203040100, 0x0, 0x0, 0x0, {0x22}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 17:09:12 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002900)=""/158, 0x9e}, 0x0, 0x2203}, 0x0) preadv2(r3, &(0x7f0000000580)=[{&(0x7f0000000600)=""/250, 0xfa}, {&(0x7f00000001c0)=""/126, 0x7e}, {&(0x7f0000000240)=""/79, 0x4f}, {&(0x7f0000000300)=""/193, 0xc1}, {&(0x7f0000000400)=""/203, 0xcb}, {&(0x7f0000000040)=""/56, 0x38}, {&(0x7f0000000500)=""/125, 0x7d}], 0x7, 0x200, 0x1, 0xc) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r0, r4, 0x0) 17:09:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) acct(0x0) (fail_nth: 1) 17:09:12 executing program 6: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@fat=@debug}]}) (fail_nth: 11) syz_open_procfs(0xffffffffffffffff, 0x0) 17:09:12 executing program 1: acct(0x0) 17:09:12 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x03)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) [ 2798.160504] FAULT_INJECTION: forcing a failure. [ 2798.160504] name failslab, interval 1, probability 0, space 0, times 0 [ 2798.162865] CPU: 1 PID: 38122 Comm: syz-executor.6 Not tainted 5.10.185 #1 [ 2798.164257] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2798.165938] Call Trace: [ 2798.166478] dump_stack+0x107/0x167 [ 2798.167223] should_fail.cold+0x5/0xa [ 2798.167991] ? create_object.isra.0+0x3a/0xa20 [ 2798.168924] should_failslab+0x5/0x20 [ 2798.169693] kmem_cache_alloc+0x5b/0x310 [ 2798.170534] create_object.isra.0+0x3a/0xa20 [ 2798.171439] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2798.172487] kmem_cache_alloc+0x159/0x310 [ 2798.173363] __alloc_file+0x21/0x320 [ 2798.174134] alloc_empty_file+0x6d/0x170 [ 2798.174976] alloc_file+0x5e/0x5a0 [ 2798.175708] alloc_file_pseudo+0x16a/0x250 [ 2798.176580] ? alloc_file+0x5a0/0x5a0 [ 2798.177381] ? shmem_get_inode+0x55c/0xbc0 [ 2798.178270] __shmem_file_setup+0x144/0x320 [ 2798.179143] ? _copy_from_user+0xfb/0x1b0 [ 2798.179982] __do_sys_memfd_create+0x275/0x450 [ 2798.180916] ? memfd_file_seals_ptr+0x170/0x170 [ 2798.181869] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2798.182933] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2798.183978] do_syscall_64+0x33/0x40 [ 2798.184763] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2798.185798] RIP: 0033:0x7f535f33bb19 [ 2798.186560] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2798.190329] RSP: 002b:00007f535c8b0f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2798.191885] RAX: ffffffffffffffda RBX: 0000000020000a00 RCX: 00007f535f33bb19 [ 2798.193363] RDX: 00007f535c8b1000 RSI: 0000000000000000 RDI: 00007f535f3950fb [ 2798.194817] RBP: 0000000000000000 R08: 00007f535c8b0ff8 R09: ffffffffffffffff [ 2798.196278] R10: 00007f535c8b0ffc R11: 0000000000000246 R12: 0000000020000480 [ 2798.197728] R13: 00000000200004c0 R14: 0000000000000000 R15: 0000000020000ac0 [ 2798.277903] FAULT_INJECTION: forcing a failure. [ 2798.277903] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2798.280152] CPU: 0 PID: 38238 Comm: syz-executor.0 Not tainted 5.10.185 #1 [ 2798.281459] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2798.283010] Call Trace: [ 2798.283510] dump_stack+0x107/0x167 [ 2798.284192] should_fail.cold+0x5/0xa [ 2798.284938] _copy_to_user+0x2e/0x180 [ 2798.285655] simple_read_from_buffer+0xcc/0x160 [ 2798.286528] proc_fail_nth_read+0x198/0x230 [ 2798.287337] ? proc_sessionid_read+0x230/0x230 [ 2798.288183] ? security_file_permission+0x24e/0x570 [ 2798.288668] FAT-fs (loop6): bogus number of reserved sectors [ 2798.289109] ? perf_trace_initcall_start+0x101/0x380 [ 2798.290347] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2798.291253] ? proc_sessionid_read+0x230/0x230 [ 2798.291270] vfs_read+0x228/0x580 [ 2798.291293] ksys_read+0x12d/0x260 [ 2798.294622] ? vfs_write+0xa70/0xa70 [ 2798.295318] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2798.296328] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2798.297296] do_syscall_64+0x33/0x40 [ 2798.297986] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2798.298931] RIP: 0033:0x7fe131b3f69c [ 2798.299618] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2798.303021] RSP: 002b:00007fe12f0e1170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2798.304408] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fe131b3f69c [ 2798.305737] RDX: 000000000000000f RSI: 00007fe12f0e11e0 RDI: 0000000000000003 [ 2798.307053] RBP: 00007fe12f0e11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2798.308351] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2798.309671] R13: 00007ffce4b218af R14: 00007fe12f0e1300 R15: 0000000000022000 [ 2798.633268] audit: type=1326 audit(1687712952.927:74): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37589 comm="syz-executor.2" exe="/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f2d5c1efb19 code=0x0 17:09:27 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) dup2(r3, r0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f00000000c0)={{0xffffffffffffffff, 0x2, 0x6e9, 0x2, 0x3567}}) dup3(r1, r2, 0x0) 17:09:27 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:09:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) acct(0x0) 17:09:27 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180)=@gcm_256={{0x303}, "2c405133020200", "776300ea4059fb3b4df3b29dc8530a1edec1e2ff32ba3eaa4f4534b21eee493b", "0c209312", "62f85214da21e819"}, 0x38) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) close(r1) pipe(&(0x7f0000000100)={0xffffffffffffffff}) splice(r2, 0x0, r1, 0x0, 0xfdef, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000140)={@dev={0xfe, 0x80, '\x00', 0x20}, 0x19}) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 17:09:27 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4001, 0x102) fcntl$getown(r0, 0x9) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r1, r2, 0x0) 17:09:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) acct(0x0) 17:09:27 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x04)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:09:27 executing program 6: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@fat=@debug}]}) (fail_nth: 12) syz_open_procfs(0xffffffffffffffff, 0x0) [ 2813.319264] FAULT_INJECTION: forcing a failure. [ 2813.319264] name failslab, interval 1, probability 0, space 0, times 0 [ 2813.321899] CPU: 0 PID: 38299 Comm: syz-executor.6 Not tainted 5.10.185 #1 [ 2813.323410] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2813.325133] Call Trace: [ 2813.325682] dump_stack+0x107/0x167 [ 2813.326442] should_fail.cold+0x5/0xa [ 2813.327235] ? security_file_alloc+0x34/0x170 [ 2813.328175] should_failslab+0x5/0x20 [ 2813.328976] kmem_cache_alloc+0x5b/0x310 [ 2813.329827] security_file_alloc+0x34/0x170 [ 2813.330734] __alloc_file+0xb6/0x320 [ 2813.331513] alloc_empty_file+0x6d/0x170 [ 2813.332372] alloc_file+0x5e/0x5a0 [ 2813.333134] alloc_file_pseudo+0x16a/0x250 [ 2813.334016] ? alloc_file+0x5a0/0x5a0 [ 2813.334816] ? shmem_get_inode+0x55c/0xbc0 [ 2813.335706] __shmem_file_setup+0x144/0x320 [ 2813.336607] ? _copy_from_user+0xfb/0x1b0 [ 2813.337497] __do_sys_memfd_create+0x275/0x450 [ 2813.338461] ? memfd_file_seals_ptr+0x170/0x170 [ 2813.339426] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2813.340521] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2813.341618] do_syscall_64+0x33/0x40 [ 2813.342383] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2813.343448] RIP: 0033:0x7f535f33bb19 [ 2813.344217] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2813.348065] RSP: 002b:00007f535c8b0f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2813.349657] RAX: ffffffffffffffda RBX: 0000000020000a00 RCX: 00007f535f33bb19 [ 2813.351149] RDX: 00007f535c8b1000 RSI: 0000000000000000 RDI: 00007f535f3950fb [ 2813.352633] RBP: 0000000000000000 R08: 00007f535c8b0ff8 R09: ffffffffffffffff [ 2813.354109] R10: 00007f535c8b0ffc R11: 0000000000000246 R12: 0000000020000480 [ 2813.355593] R13: 00000000200004c0 R14: 0000000000000000 R15: 0000000020000ac0 17:09:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) acct(0x0) 17:09:44 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) acct(0x0) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@random={'osx.', '}{@%-\x88(+\\%$2S\x00'}, &(0x7f0000000100)='\\\xd4{%+#[!.!\x00', 0xb, 0x1) 17:09:44 executing program 2: r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000001, 0x4000010, r0, 0x10000000) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r3, &(0x7f00000001c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2000, 0x1, {0x3, r4}}, 0x80000000) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x10, r0, 0x0) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r8, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002900)=""/158, 0x9e}, 0x0, 0x2203}, 0x0) syz_io_uring_submit(r5, r7, &(0x7f0000000140)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3f) r9 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r9, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002900)=""/158, 0x9e}, 0x0, 0x2203}, 0x0) syz_io_uring_submit(r1, r7, &(0x7f0000000180)=@IORING_OP_ASYNC_CANCEL={0xe, 0x5, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}, 0x5) signalfd(r9, &(0x7f0000000040)={[0x1]}, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) r11 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r10, r11, 0x0) 17:09:44 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) acct(0x0) 17:09:44 executing program 6: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@fat=@debug}]}) (fail_nth: 13) syz_open_procfs(0xffffffffffffffff, 0x0) 17:09:44 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) [ 2829.729871] FAULT_INJECTION: forcing a failure. [ 2829.729871] name failslab, interval 1, probability 0, space 0, times 0 [ 2829.732337] CPU: 1 PID: 38720 Comm: syz-executor.6 Not tainted 5.10.185 #1 [ 2829.733727] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2829.735364] Call Trace: [ 2829.735905] dump_stack+0x107/0x167 [ 2829.736630] should_fail.cold+0x5/0xa [ 2829.737394] ? create_object.isra.0+0x3a/0xa20 [ 2829.738304] should_failslab+0x5/0x20 [ 2829.739074] kmem_cache_alloc+0x5b/0x310 [ 2829.739884] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 2829.740971] create_object.isra.0+0x3a/0xa20 [ 2829.741870] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2829.742878] kmem_cache_alloc+0x159/0x310 [ 2829.743707] security_file_alloc+0x34/0x170 [ 2829.744578] __alloc_file+0xb6/0x320 [ 2829.745329] alloc_empty_file+0x6d/0x170 [ 2829.746165] alloc_file+0x5e/0x5a0 [ 2829.746873] alloc_file_pseudo+0x16a/0x250 [ 2829.747747] ? alloc_file+0x5a0/0x5a0 [ 2829.748508] ? shmem_get_inode+0x55c/0xbc0 [ 2829.749376] __shmem_file_setup+0x144/0x320 [ 2829.750234] ? _copy_from_user+0xfb/0x1b0 [ 2829.751058] __do_sys_memfd_create+0x275/0x450 [ 2829.751987] ? memfd_file_seals_ptr+0x170/0x170 [ 2829.752917] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2829.753974] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2829.754998] do_syscall_64+0x33/0x40 [ 2829.755740] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2829.756753] RIP: 0033:0x7f535f33bb19 [ 2829.757502] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2829.761140] RSP: 002b:00007f535c8b0f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2829.762641] RAX: ffffffffffffffda RBX: 0000000020000a00 RCX: 00007f535f33bb19 [ 2829.764045] RDX: 00007f535c8b1000 RSI: 0000000000000000 RDI: 00007f535f3950fb [ 2829.765465] RBP: 0000000000000000 R08: 00007f535c8b0ff8 R09: ffffffffffffffff [ 2829.766867] R10: 00007f535c8b0ffc R11: 0000000000000246 R12: 0000000020000480 [ 2829.768269] R13: 00000000200004c0 R14: 0000000000000000 R15: 0000000020000ac0 17:09:44 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\b)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:09:44 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x8000, 0x0, 0x20, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r0, r1, 0x0) 17:09:44 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x80200, 0x102) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) r1 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)=0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x4, 0x2, 0x7}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="4224c22ecd89e833333209b82871cefee6e0e7060040004b0a67947404ca2bdc717e90d74db477baff1a2b73c7c8"], 0x31b) close(r3) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ff6000/0xa000)=nil, 0xa000, 0x2, 0x13, 0xffffffffffffffff, 0x8000000) r5 = syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_POLL_REMOVE={0x7, 0x5, 0x0, 0x0, 0x0, 0x23456}, 0x7c5b) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r8}}, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000280)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd=r0, 0x4, 0x0, 0x400, 0x1, 0x0, {0x0, r8}}, 0x6) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r9 = open$dir(&(0x7f0000000140)='./file0\x00', 0x2f00, 0xe) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r9, 0x40106614, &(0x7f0000000180)) 17:09:44 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) acct(0x0) [ 2829.867627] FAT-fs (loop6): bogus number of reserved sectors [ 2829.868922] FAT-fs (loop6): Can't find a valid FAT filesystem 17:09:44 executing program 0: iopl(0x9) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) acct(0x0) 17:09:44 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) 17:09:44 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x212}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="e6"], 0x31b) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0) signalfd(r1, &(0x7f00000001c0)={[0xe3]}, 0x8) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 17:09:44 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\t)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:09:59 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) acct(0x0) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="ac744151c667dbce11d4fc633152654afb465011163bb70e61028d980ce7c2012d86bb7f5cb7e4f604000000ecbedc6008b29d4fc99793bba3d3a189e9ee5db676f72fc45eb12c1c3536a151469c10b48cef39ac5c577b3cff0452b13195425d64142d2ec409373a4dc997fb4a72b02cee2d36a6ef7ddb0287bced1cecdd094a3b14d1894164fc2a5428920f177f33"], &(0x7f0000000100)='(+\x00', 0x3, 0x1) 17:09:59 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) syz_io_uring_setup(0x1124, &(0x7f0000000140)={0x0, 0x3af, 0x4, 0x0, 0x345, 0x0, r0}, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000ce4000/0x3000)=nil, &(0x7f0000001380), &(0x7f00000013c0)=0x0) r2 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r5}}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000001400)=@IORING_OP_WRITE_FIXED={0x5, 0x1, 0x2004, @fd_index=0xa, 0x6, 0x9, 0x4, 0x10, 0x0, {0x3, r5}}, 0x7) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x84009422, &(0x7f0000001840)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f00000001c0)={r6, "1169feeb427ab0e2253af9114f0f7407"}) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000940)={0x2, 0x0, @start={r6, 0x0, "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", "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"}, [0x4, 0x7ff, 0x400, 0xfffffffffffffff9, 0x2, 0x3, 0x1, 0x97a, 0x10001, 0x1, 0x6, 0x0, 0x3, 0x0, 0x9ff, 0xc1d, 0x10000, 0x7, 0x5, 0x12, 0x8, 0x80000000, 0x7, 0x4, 0x2, 0x1, 0x10001, 0x1, 0x9, 0xfffffffffffffffb, 0x5, 0x800, 0x3, 0xff, 0xf91, 0x7, 0x0, 0xed3, 0x4, 0x100, 0x4, 0x5, 0x8, 0x1, 0xa7cb, 0x5, 0x8, 0x1, 0x1f, 0x3, 0x2, 0x3ff, 0x7, 0x7, 0xab, 0x7, 0x0, 0x2, 0x9, 0x7fffffff, 0xfff, 0x1824, 0x9946, 0x6]}) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r7, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r7) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 17:09:59 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\n)$]--\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:09:59 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) acct(0x0) 17:09:59 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x5, &(0x7f0000000100)=[{0x93, 0xfb, 0x7f, 0xc00}, {0x6, 0x40, 0x1, 0x2}, {0x801, 0x7f, 0x1, 0xa00f}, {0x40, 0x59, 0x3f, 0x200}, {0xfffe, 0x7, 0x7f, 0x1}]}) r4 = dup3(r0, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r4, 0xc018937a, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB="000000000000f3771a2700"/20]) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r5, 0xc05c5340, &(0x7f0000000140)={0xa, 0x1, 0x9, {0x1000, 0x400}, 0x400, 0x8839}) 17:09:59 executing program 6: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@fat=@debug}]}) (fail_nth: 14) syz_open_procfs(0xffffffffffffffff, 0x0) 17:09:59 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:09:59 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0xfc, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r0, r1, 0x0) [ 2845.161143] FAULT_INJECTION: forcing a failure. [ 2845.161143] name failslab, interval 1, probability 0, space 0, times 0 [ 2845.163678] CPU: 0 PID: 39382 Comm: syz-executor.6 Not tainted 5.10.185 #1 [ 2845.165126] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2845.166870] Call Trace: [ 2845.167427] dump_stack+0x107/0x167 [ 2845.168188] should_fail.cold+0x5/0xa [ 2845.168982] ? getname_flags.part.0+0x50/0x4f0 [ 2845.169941] should_failslab+0x5/0x20 [ 2845.170731] kmem_cache_alloc+0x5b/0x310 [ 2845.171580] getname_flags.part.0+0x50/0x4f0 [ 2845.172492] getname+0x8e/0xd0 [ 2845.173157] do_sys_openat2+0xf9/0x420 [ 2845.173971] ? build_open_flags+0x6f0/0x6f0 [ 2845.174858] ? find_held_lock+0x2c/0x110 [ 2845.175701] ? do_syscall_64+0x33/0x40 [ 2845.176507] __x64_sys_openat+0x13f/0x1f0 [ 2845.177365] ? __ia32_sys_open+0x1c0/0x1c0 [ 2845.178252] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2845.179340] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2845.180411] do_syscall_64+0x33/0x40 [ 2845.181201] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2845.182260] RIP: 0033:0x7f535f2eea04 [ 2845.183031] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2845.186801] RSP: 002b:00007f535c8b0ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2845.188353] RAX: ffffffffffffffda RBX: 00007f535f385970 RCX: 00007f535f2eea04 [ 2845.189820] RDX: 0000000000000002 RSI: 00007f535c8b1000 RDI: 00000000ffffff9c [ 2845.191281] RBP: 00007f535c8b1000 R08: 0000000000000000 R09: ffffffffffffffff [ 2845.192741] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2845.194216] R13: 0000000000000004 R14: 0000000020000a00 R15: 0000000000000000 17:09:59 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) acct(0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x4, &(0x7f0000000040)=[{0x5, 0x6, 0x6, 0x5}, {0x1800, 0x0, 0x0, 0x7}, {0x6, 0x81, 0xcf, 0x13}, {0x1, 0xcd, 0x9, 0x7}]}) 17:09:59 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) acct(0x0) 17:09:59 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) acct(0x0) 17:09:59 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x02', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:09:59 executing program 0: pidfd_open(0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x8c90, 0x0, 0x2, 0x7fffffff}]}) acct(0x0) 17:09:59 executing program 6: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@fat=@debug}]}) (fail_nth: 15) syz_open_procfs(0xffffffffffffffff, 0x0) 17:09:59 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:09:59 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x109880, 0x108) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) read(r0, &(0x7f00000000c0)=""/136, 0x88) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r1, r2, 0x0) [ 2845.510883] FAULT_INJECTION: forcing a failure. [ 2845.510883] name failslab, interval 1, probability 0, space 0, times 0 [ 2845.513189] CPU: 0 PID: 39813 Comm: syz-executor.6 Not tainted 5.10.185 #1 [ 2845.514547] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2845.516191] Call Trace: [ 2845.516729] dump_stack+0x107/0x167 [ 2845.517461] should_fail.cold+0x5/0xa [ 2845.518206] ? create_object.isra.0+0x3a/0xa20 [ 2845.519095] ? create_object.isra.0+0x3a/0xa20 [ 2845.520008] should_failslab+0x5/0x20 [ 2845.520747] kmem_cache_alloc+0x5b/0x310 [ 2845.521565] ? getname_flags.part.0+0x50/0x4f0 [ 2845.522454] create_object.isra.0+0x3a/0xa20 [ 2845.523301] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2845.524279] kmem_cache_alloc+0x159/0x310 [ 2845.525087] getname_flags.part.0+0x50/0x4f0 [ 2845.525946] getname+0x8e/0xd0 [ 2845.526564] do_sys_openat2+0xf9/0x420 [ 2845.527316] ? build_open_flags+0x6f0/0x6f0 [ 2845.528147] ? find_held_lock+0x2c/0x110 [ 2845.528937] ? do_syscall_64+0x33/0x40 [ 2845.529705] __x64_sys_openat+0x13f/0x1f0 [ 2845.530503] ? __ia32_sys_open+0x1c0/0x1c0 [ 2845.531329] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2845.532306] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2845.533322] do_syscall_64+0x33/0x40 [ 2845.534037] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2845.535023] RIP: 0033:0x7f535f2eea04 [ 2845.535737] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2845.539276] RSP: 002b:00007f535c8b0ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2845.540732] RAX: ffffffffffffffda RBX: 00007f535f385970 RCX: 00007f535f2eea04 [ 2845.542104] RDX: 0000000000000002 RSI: 00007f535c8b1000 RDI: 00000000ffffff9c [ 2845.543458] RBP: 00007f535c8b1000 R08: 0000000000000000 R09: ffffffffffffffff [ 2845.544807] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2845.546173] R13: 0000000000000004 R14: 0000000020000a00 R15: 0000000000000000 17:09:59 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) acct(0x0) [ 2845.633235] FAT-fs (loop6): bogus number of reserved sectors [ 2845.634498] FAT-fs (loop6): Can't find a valid FAT filesystem 17:10:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) acct(0x0) execveat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=[&(0x7f00000000c0)='\x00', &(0x7f0000000100)='[\x00', &(0x7f0000000140)='\x00'], &(0x7f0000000200)=[&(0x7f00000001c0)='$/]\x01x\';\x00'], 0x100) 17:10:13 executing program 6: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@fat=@debug}]}) (fail_nth: 16) syz_open_procfs(0xffffffffffffffff, 0x0) 17:10:13 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) acct(0x0) 17:10:13 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x11, &(0x7f0000000080)}) ioctl$F2FS_IOC_GET_FEATURES(r0, 0x8004f50c, &(0x7f0000000000)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002900)=""/158, 0x9e}, 0x0, 0x2203}, 0x0) r5 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r8}}, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT={0xb, 0x3, 0x0, 0x0, 0x3, &(0x7f0000000080), 0x1, 0x1, 0x0, {0x0, r8}}, 0x20) r9 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r1, r9, 0x0) 17:10:13 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x31b) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) close(r1) pipe(&(0x7f0000000100)={0xffffffffffffffff}) splice(r2, 0x0, r1, 0x0, 0xfdef, 0x0) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f0000000140)={'\x00', 0x8, 0x2, 0x8}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$BTRFS_IOC_DEFRAG_RANGE(r1, 0x40309410, &(0x7f00000001c0)={0x10000, 0xf5, 0x1, 0x40, 0x3, [0x8, 0x5, 0x2]}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 17:10:13 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x03', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:10:13 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r0, r1, 0x0) 17:10:13 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) [ 2859.303307] FAULT_INJECTION: forcing a failure. [ 2859.303307] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2859.305783] CPU: 0 PID: 40121 Comm: syz-executor.6 Not tainted 5.10.185 #1 [ 2859.307227] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2859.308941] Call Trace: [ 2859.309526] dump_stack+0x107/0x167 [ 2859.310289] should_fail.cold+0x5/0xa [ 2859.311084] strncpy_from_user+0x34/0x470 [ 2859.311952] getname_flags.part.0+0x95/0x4f0 [ 2859.312884] getname+0x8e/0xd0 [ 2859.313565] do_sys_openat2+0xf9/0x420 [ 2859.314374] ? build_open_flags+0x6f0/0x6f0 [ 2859.315267] ? find_held_lock+0x2c/0x110 [ 2859.316120] ? do_syscall_64+0x33/0x40 [ 2859.316934] __x64_sys_openat+0x13f/0x1f0 [ 2859.317800] ? __ia32_sys_open+0x1c0/0x1c0 [ 2859.318677] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2859.319754] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2859.320836] do_syscall_64+0x33/0x40 [ 2859.321644] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2859.322699] RIP: 0033:0x7f535f2eea04 [ 2859.323472] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2859.327437] RSP: 002b:00007f535c8b0ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2859.329074] RAX: ffffffffffffffda RBX: 00007f535f385970 RCX: 00007f535f2eea04 [ 2859.330575] RDX: 0000000000000002 RSI: 00007f535c8b1000 RDI: 00000000ffffff9c [ 2859.332044] RBP: 00007f535c8b1000 R08: 0000000000000000 R09: ffffffffffffffff [ 2859.333610] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2859.335163] R13: 0000000000000004 R14: 0000000020000a00 R15: 0000000000000000 17:10:13 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) acct(0x0) 17:10:13 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r0, r1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x1, 0x6, 0x9}) sendmsg$inet6(r2, &(0x7f0000000180)={&(0x7f0000000040)={0xa, 0x4e21, 0x800, @local, 0x20}, 0x1c, &(0x7f0000000080), 0x0, &(0x7f00000000c0)=[@tclass={{0x14, 0x29, 0x43, 0x8}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x2}}, @rthdr_2292={{0x78, 0x29, 0x39, {0x3b, 0xc, 0x0, 0x7, 0x0, [@mcast2, @loopback, @private1, @local, @rand_addr=' \x01\x00', @private2]}}}, @flowinfo={{0x14, 0x29, 0xb, 0xffffffff}}], 0xc0}, 0x4000000) 17:10:13 executing program 6: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@fat=@debug}]}) (fail_nth: 17) syz_open_procfs(0xffffffffffffffff, 0x0) 17:10:13 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) acct(0x0) 17:10:13 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) signalfd4(r1, &(0x7f0000000140)={[0x20]}, 0x8, 0x80000) 17:10:13 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:10:13 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r2, 0xffffffffffffffff, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r3 = dup2(r2, r2) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg$inet(r4, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000200)="54b12dbda72268dcd740dcb063b327361ae3ae35a6d39fca02269678d8ab920c4b2d8a9650fc7ceb5b913dcf4b4f2e19ca28d2d26c5dc8250a59b9a0fd43c46e9ffd7070ef0bc7", 0x47}, {0x0}], 0x2, &(0x7f0000001480)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}], 0x18}, 0x0) fsetxattr$security_capability(r4, &(0x7f00000000c0), &(0x7f0000000140)=@v2={0x2000000, [{0x6, 0x2}, {0x40, 0xffff}]}, 0x14, 0x0) r5 = clone3(&(0x7f0000000640)={0x20000000, &(0x7f0000000180), &(0x7f0000000280), &(0x7f0000000380), {0x2b}, &(0x7f0000000400), 0x0, &(0x7f00000004c0)=""/135, &(0x7f0000000580)=[0x0, 0xffffffffffffffff], 0x2, {r3}}, 0x58) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_config_ext={0xfffffffffffff0ef}, 0x0, 0x0, 0x2, 0x5, 0x0, 0xffffff7c, 0xfffd}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)={0x24, r8, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x6}]}, 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00ae8bef41adab918cd8170c3d88d96c0f208a0058c461ebbe21b87b23675d"]) dup3(r0, r1, 0x0) [ 2859.523503] FAULT_INJECTION: forcing a failure. [ 2859.523503] name failslab, interval 1, probability 0, space 0, times 0 [ 2859.524876] CPU: 1 PID: 40550 Comm: syz-executor.6 Not tainted 5.10.185 #1 [ 2859.525688] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2859.526639] Call Trace: [ 2859.526945] dump_stack+0x107/0x167 [ 2859.527365] should_fail.cold+0x5/0xa [ 2859.527809] ? __alloc_file+0x21/0x320 [ 2859.528247] should_failslab+0x5/0x20 [ 2859.528679] kmem_cache_alloc+0x5b/0x310 [ 2859.529144] __alloc_file+0x21/0x320 [ 2859.529593] alloc_empty_file+0x6d/0x170 [ 2859.530058] path_openat+0xe3/0x26f0 [ 2859.530490] ? path_lookupat+0x860/0x860 [ 2859.530969] ? perf_trace_lock+0xac/0x490 [ 2859.531431] ? lock_acquire+0x197/0x470 [ 2859.531883] ? __lockdep_reset_lock+0x180/0x180 [ 2859.532406] do_filp_open+0x190/0x3e0 [ 2859.532838] ? may_open_dev+0xf0/0xf0 [ 2859.533285] ? __alloc_fd+0x2b8/0x630 [ 2859.533743] ? lock_downgrade+0x6d0/0x6d0 [ 2859.534233] ? do_raw_spin_lock+0x121/0x260 [ 2859.534739] ? rwlock_bug.part.0+0x90/0x90 [ 2859.535244] ? _raw_spin_unlock+0x1a/0x30 [ 2859.535712] ? __alloc_fd+0x2b8/0x630 [ 2859.536169] do_sys_openat2+0x171/0x420 [ 2859.536634] ? build_open_flags+0x6f0/0x6f0 [ 2859.537137] ? find_held_lock+0x2c/0x110 [ 2859.537620] ? do_syscall_64+0x33/0x40 [ 2859.538076] __x64_sys_openat+0x13f/0x1f0 [ 2859.538559] ? __ia32_sys_open+0x1c0/0x1c0 [ 2859.539061] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2859.539672] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2859.540282] do_syscall_64+0x33/0x40 [ 2859.540702] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2859.541297] RIP: 0033:0x7f535f2eea04 [ 2859.541755] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2859.543902] RSP: 002b:00007f535c8b0ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2859.544807] RAX: ffffffffffffffda RBX: 00007f535f385970 RCX: 00007f535f2eea04 [ 2859.545671] RDX: 0000000000000002 RSI: 00007f535c8b1000 RDI: 00000000ffffff9c [ 2859.546515] RBP: 00007f535c8b1000 R08: 0000000000000000 R09: ffffffffffffffff [ 2859.547356] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2859.548189] R13: 0000000000000004 R14: 0000000020000a00 R15: 0000000000000000 [ 2859.622407] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 17:10:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) acct(0x0) 17:10:27 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:10:27 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) socket$inet6_udplite(0xa, 0x2, 0x88) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r2, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002900)=""/158, 0x9e}, 0x0, 0x2203}, 0x0) r3 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) io_uring_enter(r3, 0x58ab, 0x0, 0x0, 0x0, 0x0) r4 = dup3(r2, r3, 0x80000) recvmmsg(r4, &(0x7f0000000c80)=[{{&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000040)}, {&(0x7f0000000140)=""/78, 0x4e}, {&(0x7f00000001c0)=""/20, 0x14}, {&(0x7f0000000300)=""/214, 0xd6}, {&(0x7f0000000200)}, {&(0x7f0000000240)=""/120, 0x78}, {&(0x7f0000000400)=""/151, 0x97}, {&(0x7f00000004c0)}, {&(0x7f0000000500)=""/174, 0xae}], 0x9, &(0x7f0000000680)=""/183, 0xb7}, 0x81}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000740)=""/250, 0xfa}, {&(0x7f0000000840)=""/99, 0x63}, {&(0x7f00000008c0)=""/108, 0x6c}, {&(0x7f0000000940)=""/106, 0x6a}, {&(0x7f00000009c0)=""/156, 0x9c}, {&(0x7f0000000a80)=""/205, 0xcd}], 0x6, &(0x7f0000000c00)=""/98, 0x62}, 0x29}], 0x2, 0x100, 0x0) getsockopt$inet6_udp_int(r5, 0x11, 0x67, &(0x7f0000000d00), &(0x7f0000000d40)=0x4) 17:10:27 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) close(r1) pipe(&(0x7f0000000100)={0xffffffffffffffff}) splice(r2, 0x0, r1, 0x0, 0xfdef, 0x0) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000140)=0x80, 0x1) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 17:10:27 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x04', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:10:27 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r0, r1, 0x0) 17:10:27 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) acct(0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r1, 0x4, 0x42800) write(r1, &(0x7f0000000080)="1f", 0x1) r2 = creat(0x0, 0x80) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000200)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000003c0)={r3, 0x2, 0xffffffffffffffff, 0x7fffffff, 0x80000}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000040)={r3, 0x3, r0, 0xfffffffc}) 17:10:27 executing program 6: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@fat=@debug}]}) (fail_nth: 18) syz_open_procfs(0xffffffffffffffff, 0x0) [ 2873.708209] FAULT_INJECTION: forcing a failure. [ 2873.708209] name failslab, interval 1, probability 0, space 0, times 0 [ 2873.710589] CPU: 0 PID: 40883 Comm: syz-executor.6 Not tainted 5.10.185 #1 [ 2873.712091] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2873.713790] Call Trace: [ 2873.714442] dump_stack+0x107/0x167 [ 2873.715191] should_fail.cold+0x5/0xa [ 2873.716121] ? create_object.isra.0+0x3a/0xa20 [ 2873.717054] should_failslab+0x5/0x20 [ 2873.718001] kmem_cache_alloc+0x5b/0x310 [ 2873.718824] create_object.isra.0+0x3a/0xa20 [ 2873.719888] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2873.720932] kmem_cache_alloc+0x159/0x310 [ 2873.721961] __alloc_file+0x21/0x320 [ 2873.722733] alloc_empty_file+0x6d/0x170 [ 2873.723728] path_openat+0xe3/0x26f0 [ 2873.724507] ? path_lookupat+0x860/0x860 [ 2873.725499] ? perf_trace_lock+0xac/0x490 [ 2873.726368] ? lock_acquire+0x197/0x470 [ 2873.727335] ? __lockdep_reset_lock+0x180/0x180 [ 2873.728288] do_filp_open+0x190/0x3e0 [ 2873.729210] ? may_open_dev+0xf0/0xf0 [ 2873.730006] ? __alloc_fd+0x2b8/0x630 [ 2873.730935] ? lock_downgrade+0x6d0/0x6d0 [ 2873.731777] ? do_raw_spin_lock+0x121/0x260 [ 2873.732821] ? rwlock_bug.part.0+0x90/0x90 [ 2873.733721] ? _raw_spin_unlock+0x1a/0x30 [ 2873.734736] ? __alloc_fd+0x2b8/0x630 [ 2873.735521] do_sys_openat2+0x171/0x420 [ 2873.736489] ? build_open_flags+0x6f0/0x6f0 [ 2873.737366] ? find_held_lock+0x2c/0x110 [ 2873.738366] ? do_syscall_64+0x33/0x40 [ 2873.739168] __x64_sys_openat+0x13f/0x1f0 [ 2873.740175] ? __ia32_sys_open+0x1c0/0x1c0 [ 2873.741209] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2873.742313] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2873.743505] do_syscall_64+0x33/0x40 [ 2873.744261] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2873.745299] RIP: 0033:0x7f535f2eea04 [ 2873.746065] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2873.749757] RSP: 002b:00007f535c8b0ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2873.751283] RAX: ffffffffffffffda RBX: 00007f535f385970 RCX: 00007f535f2eea04 [ 2873.752709] RDX: 0000000000000002 RSI: 00007f535c8b1000 RDI: 00000000ffffff9c [ 2873.754150] RBP: 00007f535c8b1000 R08: 0000000000000000 R09: ffffffffffffffff [ 2873.755578] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2873.757002] R13: 0000000000000004 R14: 0000000020000a00 R15: 0000000000000000 17:10:28 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) acct(0x0) 17:10:28 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) acct(0x0) clock_gettime(0x0, &(0x7f0000000640)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000006c0)={0x0, 0x0}) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_LINK_TIMEOUT={0xf, 0x2, 0x0, 0x0, 0x0, &(0x7f0000000700)={r2, r3+60000000}, 0x1, 0x0, 0x0, {0x0, r4}}, 0x6) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000600)=[{{&(0x7f00000000c0)=@abs, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000140)=""/128, 0x80}, {&(0x7f0000000040)=""/56, 0x38}, {&(0x7f00000001c0)=""/140, 0x8c}, {&(0x7f0000000280)=""/209, 0xd1}, {&(0x7f0000000380)=""/139, 0x8b}], 0x5, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x120}}], 0x1, 0x40, &(0x7f0000000680)={r0, r1+10000000}) [ 2873.783492] audit: type=1326 audit(1687713028.079:75): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=40893 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f94b118eb19 code=0x0 17:10:28 executing program 0: sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4090}, 0xc800) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000180)={0xffffffffffffffff, 0x20000000000000e, 0x2b4b88f9, 0x4}) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x4, 0xa, 0x101, 0x0, 0x0, {0x7, 0x0, 0x1}, [@NFTA_CHAIN_TYPE={0xb, 0x7, 'filter\x00'}, @NFTA_CHAIN_COUNTERS={0x28, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x81}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x9}]}]}, 0x48}, 0x1, 0x0, 0x0, 0xc4}, 0x2400c815) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) acct(0x0) 17:10:28 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1fffffffffffffa8, &(0x7f0000000080)=[{0x26, 0x3, 0x10, 0x7fffffff}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000140)) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) r2 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3, 0x100010, r2, 0x0) syz_io_uring_setup(0x7fe9, &(0x7f0000000240)={0x0, 0xe7cd, 0x10, 0x3, 0x2a8, 0x0, r2}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040), &(0x7f00000001c0)=0x0) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000300), 0x20200, 0x0) r6 = socket$inet(0x2, 0x3, 0x1ff) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r9 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r9, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002900)=""/158, 0x9e}, 0x0, 0x2203}, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000380)=@IORING_OP_FILES_UPDATE={0x14, 0x1, 0x0, 0x0, 0x1fc7, &(0x7f0000000340)=[r5, r6, r9], 0x3}, 0x8) io_uring_enter(r2, 0x58ab, 0x0, 0x0, 0x0, 0x0) r10 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) io_uring_enter(r10, 0x58ab, 0x0, 0x0, 0x0, 0x0) dup3(r10, r2, 0x80000) r11 = socket$inet6_udplite(0xa, 0x2, 0x88) r12 = dup2(r1, r11) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r12, 0xc0502100, &(0x7f00000000c0)) 17:10:28 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x05', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) [ 2873.941276] FAT-fs (loop6): bogus number of reserved sectors [ 2873.942601] FAT-fs (loop6): Can't find a valid FAT filesystem 17:10:28 executing program 0: acct(0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@xfs_parent={0x1c, 0x82, {0x5, 0x0, 0x20, 0x8}}, &(0x7f0000000140), 0x1000) linkat(0xffffffffffffff9c, &(0x7f0000000000)='\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) 17:10:28 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:10:28 executing program 6: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@fat=@debug}]}) (fail_nth: 19) syz_open_procfs(0xffffffffffffffff, 0x0) 17:10:28 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) close(r1) pipe(&(0x7f0000000100)={0xffffffffffffffff}) splice(r2, 0x0, r1, 0x0, 0xfdef, 0x0) clone3(&(0x7f0000000140)={0xf081a00, 0x0, 0x0, 0x0, {0x80800000}, 0x0, 0x5d, 0x0, 0x0, 0x0, {r2}}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 17:10:28 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0xee00}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000140)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x4a0340) r4 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) io_uring_enter(r4, 0x58ab, 0x0, 0x0, 0x0, 0x0) ftruncate(r4, 0x7) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r3, 0x8008f511, &(0x7f00000001c0)) io_uring_enter(0xffffffffffffffff, 0x6d31, 0x695f, 0x2, &(0x7f0000000040), 0x8) dup3(r2, r3, 0x0) [ 2874.126342] FAULT_INJECTION: forcing a failure. [ 2874.126342] name failslab, interval 1, probability 0, space 0, times 0 [ 2874.128805] CPU: 0 PID: 41413 Comm: syz-executor.6 Not tainted 5.10.185 #1 [ 2874.130236] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2874.131920] Call Trace: [ 2874.132465] dump_stack+0x107/0x167 [ 2874.133215] should_fail.cold+0x5/0xa [ 2874.134003] ? security_file_alloc+0x34/0x170 [ 2874.134919] should_failslab+0x5/0x20 [ 2874.135693] kmem_cache_alloc+0x5b/0x310 [ 2874.136520] security_file_alloc+0x34/0x170 [ 2874.137404] __alloc_file+0xb6/0x320 [ 2874.138179] alloc_empty_file+0x6d/0x170 [ 2874.139012] path_openat+0xe3/0x26f0 [ 2874.139778] ? path_lookupat+0x860/0x860 [ 2874.140603] ? perf_trace_lock+0xac/0x490 [ 2874.141448] ? lock_acquire+0x197/0x470 [ 2874.142262] ? __lockdep_reset_lock+0x180/0x180 [ 2874.143209] do_filp_open+0x190/0x3e0 [ 2874.143977] ? may_open_dev+0xf0/0xf0 [ 2874.144754] ? __alloc_fd+0x2b8/0x630 [ 2874.145525] ? lock_downgrade+0x6d0/0x6d0 [ 2874.146383] ? do_raw_spin_lock+0x121/0x260 [ 2874.147386] ? rwlock_bug.part.0+0x90/0x90 [ 2874.148267] ? _raw_spin_unlock+0x1a/0x30 [ 2874.149267] ? __alloc_fd+0x2b8/0x630 [ 2874.150084] do_sys_openat2+0x171/0x420 [ 2874.151051] ? build_open_flags+0x6f0/0x6f0 [ 2874.151918] ? find_held_lock+0x2c/0x110 [ 2874.152908] ? do_syscall_64+0x33/0x40 [ 2874.153724] __x64_sys_openat+0x13f/0x1f0 [ 2874.154731] ? __ia32_sys_open+0x1c0/0x1c0 [ 2874.155609] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2874.156877] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2874.157949] do_syscall_64+0x33/0x40 [ 2874.158862] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2874.159900] RIP: 0033:0x7f535f2eea04 [ 2874.160802] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2874.164541] RSP: 002b:00007f535c8b0ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2874.166395] RAX: ffffffffffffffda RBX: 00007f535f385970 RCX: 00007f535f2eea04 [ 2874.167852] RDX: 0000000000000002 RSI: 00007f535c8b1000 RDI: 00000000ffffff9c [ 2874.169321] RBP: 00007f535c8b1000 R08: 0000000000000000 R09: ffffffffffffffff [ 2874.171058] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2874.172522] R13: 0000000000000004 R14: 0000000020000a00 R15: 0000000000000000 17:10:28 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7dffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup3(r0, r1, 0x0) 17:10:28 executing program 0: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000080)={{0x2, 0x4e22, @loopback}, {0x6, @random="79ed7d82437f"}, 0x20, {0x2, 0x4e21, @multicast2}, 'veth1_to_team\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) acct(0x0) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) copy_file_range(r2, &(0x7f0000000140)=0x1, r2, &(0x7f0000000180)=0x80000001, 0x6, 0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r2, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002900)=""/158, 0x9e}, 0x0, 0x2203}, 0x0) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002900)=""/158, 0x9e}, 0x0, 0x2203}, 0x0) syz_io_uring_setup(0x7f1b, &(0x7f0000000240)={0x0, 0x6f32, 0x1, 0x0, 0x35f}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f00000002c0)=0x0) syz_io_uring_submit(r3, r6, &(0x7f0000000300)=@IORING_OP_ASYNC_CANCEL={0xe, 0x6ca9cbefa00e4a79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8) ioctl(r2, 0x8001, &(0x7f0000000100)="defa1e73ce39adf484b2c2780f32dcd9653b78e3a12636589487145e4eed8699404449b93a8944aef6f9b0a3faa8ae") [ 2874.212430] audit: type=1326 audit(1687713028.508:76): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41418 comm="syz-executor.2" exe="/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f2d5c1efb19 code=0x7dff0000 17:10:43 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x06', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:10:43 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) acct(0x0) 17:10:43 executing program 4: setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000140)=ANY=[@ANYBLOB="000c0000000000108015a74ee0d00b9922d25a7d6fdca9c1aa3e0c82ae76c0c910000000000000000000000000000000010738000000010c06eb9c9c050000000000000800000000000000ff0000000000000003000000000000003f2c14b4d8e088ad06000000001000000000000000"], 0x70) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) r3 = syz_open_pts(0xffffffffffffffff, 0x0) close_range(r1, r3, 0x2) r4 = creat(0x0, 0x80) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000200)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000003c0)={r5, 0x2, 0xffffffffffffffff, 0x7fffffff, 0x80000}) socket$packet(0x11, 0x3, 0x300) r6 = syz_io_uring_setup(0x1b32, &(0x7f0000000080)={0x0, 0x1, 0x18, 0x0, 0x100, 0x0, r4}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)) io_uring_enter(r6, 0x58ab, 0x0, 0x0, 0x0, 0x0) r8 = creat(0x0, 0x80) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r8, 0xc0502100, &(0x7f0000000200)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000280)={0x0, 0x2, 0xffffffffffffffff, 0x7fffffff}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f00000001c0)={r9, 0x2, r6, 0x27fff, 0x80000}) dup3(r1, r2, 0x0) r10 = syz_io_uring_complete(r7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r10, 0x40182103, &(0x7f0000000040)={r11, 0x2, r0, 0x5ed}) 17:10:43 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f00000012c0)=0x8, 0x4) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:10:43 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) socket$inet6_udplite(0xa, 0x2, 0x88) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 17:10:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x20140, 0x1) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_STATION(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r1, 0x200, 0x9, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_STA_TX_POWER={0x6, 0x114, 0x9}, @NL80211_ATTR_STA_FLAGS2={0xc, 0x43, {0x453b73ae, 0xfffff801}}, @NL80211_ATTR_MGMT_SUBTYPE={0x5, 0x29, 0xa}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000810}, 0x24000880) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) acct(0x0) 17:10:43 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) lsetxattr$security_ima(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=@md5={0x1, "0172c0af461367723b3893ae6f76f1eb"}, 0x11, 0x2) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\t'], 0x31b) close(r0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) close(r1) pipe(&(0x7f0000000100)={0xffffffffffffffff}) splice(r2, 0x0, r1, 0x0, 0xfdef, 0x0) openat(r2, &(0x7f0000000140)='./file1\x00', 0x101200, 0x20) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 17:10:43 executing program 6: syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a00), 0x0, &(0x7f0000000ac0)={[{@fat=@debug}]}) (fail_nth: 20) syz_open_procfs(0xffffffffffffffff, 0x0) [ 2888.819702] FAULT_INJECTION: forcing a failure. [ 2888.819702] name failslab, interval 1, probability 0, space 0, times 0 [ 2888.822180] CPU: 0 PID: 41745 Comm: syz-executor.6 Not tainted 5.10.185 #1 [ 2888.823667] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2888.825445] Call Trace: [ 2888.826046] dump_stack+0x107/0x167 [ 2888.826828] should_fail.cold+0x5/0xa [ 2888.827642] ? create_object.isra.0+0x3a/0xa20 [ 2888.828618] should_failslab+0x5/0x20 [ 2888.829429] kmem_cache_alloc+0x5b/0x310 [ 2888.830305] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 2888.831482] create_object.isra.0+0x3a/0xa20 [ 2888.832420] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2888.833507] kmem_cache_alloc+0x159/0x310 [ 2888.834415] security_file_alloc+0x34/0x170 [ 2888.835339] __alloc_file+0xb6/0x320 [ 2888.836140] alloc_empty_file+0x6d/0x170 [ 2888.837009] path_openat+0xe3/0x26f0 [ 2888.837825] ? path_lookupat+0x860/0x860 [ 2888.838693] ? perf_trace_lock+0xac/0x490 [ 2888.839574] ? lock_acquire+0x197/0x470 [ 2888.840426] ? __lockdep_reset_lock+0x180/0x180 [ 2888.841422] do_filp_open+0x190/0x3e0 [ 2888.842235] ? may_open_dev+0xf0/0xf0 [ 2888.843092] ? __alloc_fd+0x2b8/0x630 [ 2888.843904] ? lock_downgrade+0x6d0/0x6d0 [ 2888.844778] ? do_raw_spin_lock+0x121/0x260 [ 2888.845689] ? rwlock_bug.part.0+0x90/0x90 [ 2888.846607] ? _raw_spin_unlock+0x1a/0x30 [ 2888.847477] ? __alloc_fd+0x2b8/0x630 [ 2888.848289] do_sys_openat2+0x171/0x420 [ 2888.849128] ? build_open_flags+0x6f0/0x6f0 [ 2888.850037] ? find_held_lock+0x2c/0x110 [ 2888.850899] ? do_syscall_64+0x33/0x40 [ 2888.851727] __x64_sys_openat+0x13f/0x1f0 [ 2888.852598] ? __ia32_sys_open+0x1c0/0x1c0 [ 2888.853498] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2888.854609] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2888.855696] do_syscall_64+0x33/0x40 [ 2888.856481] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2888.857560] RIP: 0033:0x7f535f2eea04 [ 2888.858359] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2888.862246] RSP: 002b:00007f535c8b0ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2888.863851] RAX: ffffffffffffffda RBX: 00007f535f385970 RCX: 00007f535f2eea04 [ 2888.865345] RDX: 0000000000000002 RSI: 00007f535c8b1000 RDI: 00000000ffffff9c [ 2888.866850] RBP: 00007f535c8b1000 R08: 0000000000000000 R09: ffffffffffffffff [ 2888.868343] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2888.869810] R13: 0000000000000004 R14: 0000000020000a00 R15: 0000000000000000 [ 2888.874401] audit: type=1326 audit(1687713043.170:77): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=41736 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f94b118eb19 code=0x0 17:10:43 executing program 7: mount(0x0, 0x0, &(0x7f0000000040)='squashfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\a', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r2, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000012c0)=0x8, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x9bbb) 17:10:43 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x5, &(0x7f0000000140)=[{0x1, 0x2, 0x3f, 0x1}, {0x5, 0x9, 0x1, 0x5}, {0x0, 0x30, 0x5, 0x401}, {0x9, 0x40, 0x0, 0x80000002}, {0x0, 0x1, 0x81, 0x2c}]}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0xffffff81, 0x7ff}}, './file0\x00'}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) close(r2) pipe(&(0x7f0000000100)={0xffffffffffffffff}) splice(r3, 0x0, r2, 0x0, 0xfdef, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000c40), 0x200080, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r6, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002900)=""/158, 0x9e}, 0x0, 0x2203}, 0x0) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r9 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r9, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002900)=""/158, 0x9e}, 0x0, 0x2203}, 0x0) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b40)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000e00)={@mcast1, 0x28, r10}) ioctl$BTRFS_IOC_DEV_REPLACE(r1, 0xca289435, &(0x7f0000000e40)={0x1, 0x5, @status={[0xaea0, 0x2, 0x6, 0x7, 0x0, 0x5]}, [0x1c00000, 0x1, 0x2, 0x7ff, 0x8, 0x8, 0x8, 0x9, 0x7, 0xef6b, 0x8000, 0x7ff, 0xc1b, 0x3, 0x4, 0x0, 0xfffffffffffffffc, 0x80000000, 0x6, 0x4, 0xfffffffffffffbff, 0x1, 0x7ff, 0x5b62, 0x80000001, 0x6, 0xd7af, 0x0, 0x100000000, 0x2, 0x8, 0x85, 0x9, 0x800, 0x9, 0x7, 0x2, 0xc9, 0x4, 0x8, 0x200, 0x439a, 0xff, 0x3, 0x1, 0x0, 0x2, 0x10000, 0x4, 0x3, 0x5, 0x401, 0x4, 0x1, 0x7, 0x100000001, 0x3, 0xc8, 0x200, 0x81, 0x9, 0x2, 0x94, 0xaf5]}) acct(0x0) read(r0, &(0x7f0000000040)=""/8, 0x8) 17:10:43 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000040)={@mcast1}, &(0x7f00000000c0)=0x14) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@private}}, &(0x7f0000000240)=0xe8) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = geteuid() stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)=0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000004c0)={{}, {0x1, 0x1}, [{0x2, 0x4, r3}, {0x2, 0x2, r4}, {0x2, 0x2, 0xee00}, {0x2, 0x3, r5}, {0x2, 0x4, r6}, {0x2, 0x1, r7}, {0x2, 0x1, 0xffffffffffffffff}], {0x4, 0x2}, [{0x8, 0x6, r8}, {0x8, 0x1, 0xffffffffffffffff}, {0x8, 0x2, 0xffffffffffffffff}, {0x8, 0x1, 0xffffffffffffffff}, {0x8, 0x2, r9}], {}, {0x20, 0x1}}, 0x84, 0x3) dup3(r1, r2, 0x0) 17:10:43 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) readahead(r0, 0x2, 0x80) dup3(r0, r1, 0x0) 17:10:43 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) acct(0x0) ioctl$F2FS_IOC_RESIZE_FS(r0, 0x4008f510, &(0x7f0000000040)=0x99e) 17:10:43 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) dup(r0) dup3(r0, r1, 0x0) 17:10:43 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x71d7b000) syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000100)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000400)) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x20) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) rmdir(&(0x7f0000000040)='./file0\x00') setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{0x304}, "1df5279a65b88209", "dba5a11a1c9cd97eabe38e4bf8bee122", "1d7cdd4c", "c34791d12986805e"}, 0x28) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfdef) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf32(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x31b) close(r1) open(&(0x7f0000000240)='./file1\x00', 0x4000, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x2000081, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_user}, {@uname={'uname', 0x3d, '^]-('}}, {@afid}, {@uname={'uname', 0x3d, '@(%:-\\.*]..'}}, {@access_client}], [{@fowner_lt={'fowner<', 0xee00}}, {@smackfshat={'smackfshat', 0x3d, '\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 17:10:43 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x82080, 0x4) unlinkat(0xffffffffffffffff, 0x0, 0x200) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)=[&(0x7f0000000240)=')\x01)$]--\x00', 0x0, &(0x7f0000000300)='\x00'], &(0x7f0000000600)=[&(0x7f0000000380)='\x00', &(0x7f00000003c0)='--\x00', &(0x7f0000000400)='\x00', 0xfffffffffffffffe, &(0x7f0000000440)='@%-@[\x00', &(0x7f0000000480)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='%.{\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='\x00'], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0xddb4, 0x406c80) mknodat(r3, &(0x7f0000000200)='./file1\x00', 0x400, 0x0) setsockopt$sock_int(r2, 0x1, 0x2f, 0x0, 0x0) mount(&(0x7f00000002c0)=@nullb, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000700)='ocfs2_dlmfs\x00', 0x20000, &(0x7f0000000740)='$\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 17:10:43 executing program 0: syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan4\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0xe5, 0x0, 0x100}]}) acct(0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), r0) [ 2889.183109] FAT-fs (loop6): bogus number of reserved sectors [ 2889.184490] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2889.186055] audit: type=1326 audit(1687713043.482:78): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42461 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe131b8cb19 code=0x0 [ 2890.014602] audit: type=1326 audit(1687713044.310:79): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=42461 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe131b8cb19 code=0x0 VM DIAGNOSIS: 17:15:49 Registers: info registers vcpu 0 RAX=ffffffff83e4f2a0 RBX=0000000000000000 RCX=ffffffff83e3737c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e4f8a8 RBP=fffffbfff09c6450 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85670648 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e4f2ae RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00005585e8ce7678 CR3=000000000d27a000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000600 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=003d03fe016c6c6f502e726567616e61 XMM02=003c03fe016c6c6f502e726567616e61 XMM03=00000601017cdfc809fc0101039aff0f XMM04=78650d0065676169727420636578650b XMM05=6578650a00657a696d696e696d206365 XMM06=6f74756365786511006873616d732063 XMM07=63657865090073747261747365722072 XMM08=69646e616320636578650e006e656720 XMM09=676169727420636578650b0065746164 XMM10=657a696d696e696d20636578650d0065 XMM11=786511006873616d7320636578650a00 XMM12=00737472617473657220726f74756365 XMM13=636578650a007a7a7566206365786509 XMM14=65657320636578650a0073746e696820 XMM15=00006c61746f7420636578650a007364 info registers vcpu 1 RAX=ffffffff83e4f2a0 RBX=0000000000000001 RCX=ffffffff83e3737c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e4f8a8 RBP=ffffed100112d000 RSP=ffff88800897fe70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85670648 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e4f2ae RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f14ef89a010 CR3=000000000d27a000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=000000000000000041859e7a40000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000