[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 891.205234] EXT4-fs (sda): test_dummy_encryption option not supported 03:05:28 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000600, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 891.229780] EXT4-fs (sda): test_dummy_encryption option not supported 03:05:28 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:05:28 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 891.330937] FAULT_INJECTION: forcing a failure. [ 891.330937] name failslab, interval 1, probability 0, space 0, times 0 03:05:28 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 891.333577] CPU: 1 PID: 6642 Comm: syz-executor.3 Not tainted 5.10.165 #1 [ 891.334958] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 891.336635] Call Trace: [ 891.337179] dump_stack+0x107/0x167 [ 891.337919] should_fail.cold+0x5/0xa [ 891.338686] ? create_object.isra.0+0x3a/0xa20 [ 891.339606] ? create_object.isra.0+0x3a/0xa20 [ 891.340537] should_failslab+0x5/0x20 [ 891.341307] kmem_cache_alloc+0x5b/0x360 [ 891.342135] create_object.isra.0+0x3a/0xa20 [ 891.343020] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 891.344069] __kmalloc+0x16e/0x3f0 [ 891.344801] trace_probe_init+0x6a/0x4e0 [ 891.345628] alloc_trace_kprobe+0x2ce/0x510 [ 891.346498] ? __startup_64+0x7/0x3b0 [ 891.347273] ? __startup_64+0x7/0x3b0 [ 891.348053] ? create_local_trace_kprobe+0x22/0x3b0 [ 891.349073] ? __startup_64+0x7/0x3b0 [ 891.349839] ? __startup_64+0x7/0x3b0 03:05:28 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 891.350614] create_local_trace_kprobe+0x4c/0x3b0 [ 891.351763] perf_kprobe_init+0x18c/0x280 [ 891.352859] perf_kprobe_event_init+0xf8/0x1c0 [ 891.354046] perf_try_init_event+0x130/0x570 [ 891.355193] perf_event_alloc.part.0+0xd96/0x2b30 [ 891.356492] __do_sys_perf_event_open+0x580/0x2cb0 [ 891.357725] ? perf_event_set_output+0x5b0/0x5b0 [ 891.358803] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 891.359972] ? __startup_64+0x7/0x3b0 [ 891.360843] ? syscall_enter_from_user_mode+0x1d/0x50 [ 891.361998] do_syscall_64+0x33/0x40 [ 891.362791] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 891.363915] RIP: 0033:0x7fd37ad89b19 [ 891.364721] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 891.368658] RSP: 002b:00007fd3782ff188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 891.370208] RAX: ffffffffffffffda RBX: 00007fd37ae9cf60 RCX: 00007fd37ad89b19 [ 891.371753] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 891.373329] RBP: 00007fd3782ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 891.374900] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 891.376501] R13: 00007fff559d5caf R14: 00007fd3782ff300 R15: 0000000000022000 [ 891.417122] 9pnet: Insufficient options for proto=fd [ 891.424515] 9pnet: Insufficient options for proto=fd 03:05:28 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000700, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:05:28 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 891.501123] EXT4-fs (sda): test_dummy_encryption option not supported [ 891.511715] EXT4-fs (sda): test_dummy_encryption option not supported 03:05:28 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 891.585726] 9pnet: Insufficient options for proto=fd 03:05:43 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000008, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:05:43 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xae0b, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:05:43 executing program 5: r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r1, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:05:43 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:05:43 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:05:43 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000ca1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:05:43 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:05:43 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 10) [ 906.508820] 9pnet: Insufficient options for proto=fd [ 906.510686] EXT4-fs (sda): test_dummy_encryption option not supported [ 906.516271] 9pnet: Insufficient options for proto=fd [ 906.536815] EXT4-fs (sda): test_dummy_encryption option not supported [ 906.566365] FAULT_INJECTION: forcing a failure. [ 906.566365] name failslab, interval 1, probability 0, space 0, times 0 [ 906.569153] CPU: 1 PID: 6683 Comm: syz-executor.3 Not tainted 5.10.165 #1 [ 906.570565] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 906.572299] Call Trace: [ 906.572850] dump_stack+0x107/0x167 [ 906.573605] should_fail.cold+0x5/0xa [ 906.574395] should_failslab+0x5/0x20 [ 906.575176] __kmalloc_track_caller+0x79/0x3c0 [ 906.576116] ? trace_probe_init+0x227/0x4e0 [ 906.577020] kstrdup+0x36/0x70 [ 906.577678] trace_probe_init+0x227/0x4e0 [ 906.578526] alloc_trace_kprobe+0x2ce/0x510 [ 906.579399] ? __startup_64+0x7/0x3b0 [ 906.580179] ? __startup_64+0x7/0x3b0 [ 906.580968] ? __startup_64+0x7/0x3b0 [ 906.581752] ? __startup_64+0x7/0x3b0 [ 906.582537] create_local_trace_kprobe+0x4c/0x3b0 [ 906.583541] perf_kprobe_init+0x18c/0x280 [ 906.584436] perf_kprobe_event_init+0xf8/0x1c0 [ 906.585385] perf_try_init_event+0x130/0x570 [ 906.586313] perf_event_alloc.part.0+0xd96/0x2b30 [ 906.587320] __do_sys_perf_event_open+0x580/0x2cb0 [ 906.588364] ? __mutex_unlock_slowpath+0xe1/0x600 [ 906.589354] ? perf_event_set_output+0x5b0/0x5b0 [ 906.590331] ? wait_for_completion_io+0x270/0x270 [ 906.591323] ? __startup_64+0x7/0x3b0 [ 906.592127] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 906.593228] ? syscall_enter_from_user_mode+0x1d/0x50 [ 906.594297] do_syscall_64+0x33/0x40 [ 906.595073] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 906.596132] RIP: 0033:0x7fd37ad89b19 [ 906.596922] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 906.600695] RSP: 002b:00007fd3782ff188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 906.602272] RAX: ffffffffffffffda RBX: 00007fd37ae9cf60 RCX: 00007fd37ad89b19 [ 906.603753] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 906.605251] RBP: 00007fd3782ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 906.606715] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 906.608153] R13: 00007fff559d5caf R14: 00007fd3782ff300 R15: 0000000000022000 [ 906.611679] trace_kprobe: Failed to allocate trace_probe.(-12) 03:05:43 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:05:43 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20001000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:05:43 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:05:43 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 906.683452] 9pnet: Insufficient options for proto=fd 03:05:43 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x80000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:05:43 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 906.691845] 9pnet: Insufficient options for proto=fd [ 906.738799] EXT4-fs (sda): test_dummy_encryption option not supported [ 906.760848] EXT4-fs (sda): test_dummy_encryption option not supported 03:05:43 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20001020, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:05:43 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x5, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 906.847139] 9pnet: Insufficient options for proto=fd [ 906.859461] 9pnet: Insufficient options for proto=fd 03:05:58 executing program 5: syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:05:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000009, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:05:58 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x5, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:05:58 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, 0x0) 03:05:58 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20002000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:05:58 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xe0ffff, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:05:58 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 11) 03:05:58 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x6, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 921.332101] 9pnet_virtio: no channels available for device 9p [ 921.334686] 9pnet: Insufficient options for proto=fd [ 921.349720] 9pnet: Insufficient options for proto=fd 03:05:58 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, 0x0) [ 921.360872] EXT4-fs (sda): test_dummy_encryption option not supported [ 921.382515] EXT4-fs (sda): test_dummy_encryption option not supported 03:05:58 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20002010, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 921.443790] 9pnet_virtio: no channels available for device 9p 03:05:58 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x6, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:05:58 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, 0x0) 03:05:58 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x7, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:05:58 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1000000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 921.558446] 9pnet: Insufficient options for proto=fd [ 921.572341] 9pnet: Insufficient options for proto=fd [ 921.577814] 9pnet_virtio: no channels available for device 9p [ 921.579259] EXT4-fs (sda): test_dummy_encryption option not supported [ 921.580174] FAULT_INJECTION: forcing a failure. [ 921.580174] name failslab, interval 1, probability 0, space 0, times 0 [ 921.583955] CPU: 0 PID: 6855 Comm: syz-executor.3 Not tainted 5.10.165 #1 [ 921.585262] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 921.586884] Call Trace: [ 921.587385] dump_stack+0x107/0x167 [ 921.588092] should_fail.cold+0x5/0xa [ 921.588800] ? create_object.isra.0+0x3a/0xa20 [ 921.589679] ? create_object.isra.0+0x3a/0xa20 [ 921.590530] should_failslab+0x5/0x20 [ 921.591226] kmem_cache_alloc+0x5b/0x360 [ 921.591978] ? lock_downgrade+0x6d0/0x6d0 [ 921.592757] create_object.isra.0+0x3a/0xa20 [ 921.593580] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 921.594525] __kmalloc_track_caller+0x177/0x3c0 [ 921.595434] ? trace_probe_init+0x227/0x4e0 [ 921.596236] kstrdup+0x36/0x70 [ 921.596861] trace_probe_init+0x227/0x4e0 [ 921.597665] alloc_trace_kprobe+0x2ce/0x510 [ 921.598498] ? __startup_64+0x7/0x3b0 [ 921.599225] ? __startup_64+0x7/0x3b0 [ 921.599961] ? __startup_64+0x7/0x3b0 [ 921.600701] ? __startup_64+0x7/0x3b0 [ 921.601438] create_local_trace_kprobe+0x4c/0x3b0 [ 921.602356] perf_kprobe_init+0x18c/0x280 [ 921.603130] perf_kprobe_event_init+0xf8/0x1c0 [ 921.603975] perf_try_init_event+0x130/0x570 [ 921.604801] perf_event_alloc.part.0+0xd96/0x2b30 [ 921.605707] __do_sys_perf_event_open+0x580/0x2cb0 [ 921.606618] ? __mutex_unlock_slowpath+0xe1/0x600 [ 921.607522] ? perf_event_set_output+0x5b0/0x5b0 [ 921.608404] ? wait_for_completion_io+0x270/0x270 [ 921.609344] ? __startup_64+0x7/0x3b0 [ 921.610055] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 921.611070] ? syscall_enter_from_user_mode+0x1d/0x50 [ 921.612012] do_syscall_64+0x33/0x40 [ 921.612739] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 921.613664] RIP: 0033:0x7fd37ad89b19 [ 921.614379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 921.617760] RSP: 002b:00007fd3782ff188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 921.619152] RAX: ffffffffffffffda RBX: 00007fd37ae9cf60 RCX: 00007fd37ad89b19 [ 921.620465] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 921.621788] RBP: 00007fd3782ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 921.623088] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 921.624391] R13: 00007fff559d5caf R14: 00007fd3782ff300 R15: 0000000000022000 03:05:58 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=']) [ 921.632228] EXT4-fs (sda): test_dummy_encryption option not supported 03:05:58 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x7, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 921.723589] 9pnet: Insufficient options for proto=fd 03:06:15 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000010, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:06:15 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:06:15 executing program 5: syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:06:16 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:06:16 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x2000a10c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:06:16 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=']) 03:06:16 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2000000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:06:16 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 12) [ 938.985783] 9pnet: Insufficient options for proto=fd [ 938.997217] 9pnet: Insufficient options for proto=fd [ 938.997424] 9pnet: Insufficient options for proto=fd [ 939.003223] EXT4-fs (sda): test_dummy_encryption option not supported 03:06:16 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=']) [ 939.015427] EXT4-fs (sda): test_dummy_encryption option not supported 03:06:16 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x25000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:06:16 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:06:16 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:06:16 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x3000000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 939.101209] 9pnet: Insufficient options for proto=fd 03:06:16 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX]) [ 939.118970] FAULT_INJECTION: forcing a failure. [ 939.118970] name failslab, interval 1, probability 0, space 0, times 0 [ 939.123966] CPU: 0 PID: 6997 Comm: syz-executor.3 Not tainted 5.10.165 #1 [ 939.125389] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 939.127072] Call Trace: [ 939.127629] dump_stack+0x107/0x167 [ 939.128376] should_fail.cold+0x5/0xa [ 939.129174] should_failslab+0x5/0x20 [ 939.129948] __kmalloc_track_caller+0x79/0x3c0 [ 939.130870] ? trace_probe_init+0x284/0x4e0 [ 939.131756] kstrdup+0x36/0x70 [ 939.132405] trace_probe_init+0x284/0x4e0 [ 939.133244] ? alloc_trace_kprobe+0x1f0/0x510 [ 939.134149] alloc_trace_kprobe+0x2ce/0x510 [ 939.135019] ? __startup_64+0x7/0x3b0 [ 939.135779] ? __startup_64+0x7/0x3b0 [ 939.136551] ? __startup_64+0x7/0x3b0 [ 939.137331] ? __startup_64+0x7/0x3b0 [ 939.138100] create_local_trace_kprobe+0x4c/0x3b0 [ 939.139081] perf_kprobe_init+0x18c/0x280 [ 939.139927] perf_kprobe_event_init+0xf8/0x1c0 [ 939.140856] perf_try_init_event+0x130/0x570 [ 939.141750] perf_event_alloc.part.0+0xd96/0x2b30 [ 939.142735] __do_sys_perf_event_open+0x580/0x2cb0 [ 939.143741] ? lapic_timer_set_periodic+0x60/0x60 [ 939.144725] ? perf_event_set_output+0x5b0/0x5b0 [ 939.145693] ? tick_program_event+0xa8/0x140 [ 939.146590] ? __startup_64+0x7/0x3b0 [ 939.147375] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 939.148435] ? syscall_enter_from_user_mode+0x1d/0x50 [ 939.149529] do_syscall_64+0x33/0x40 [ 939.150287] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 939.151324] RIP: 0033:0x7fd37ad89b19 [ 939.152080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 939.155789] RSP: 002b:00007fd3782ff188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 939.157354] RAX: ffffffffffffffda RBX: 00007fd37ae9cf60 RCX: 00007fd37ad89b19 [ 939.158785] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 939.160215] RBP: 00007fd3782ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 939.161666] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 939.163100] R13: 00007fff559d5caf R14: 00007fd3782ff300 R15: 0000000000022000 [ 939.166222] trace_kprobe: Failed to allocate trace_probe.(-12) [ 939.184448] 9pnet: Insufficient options for proto=fd 03:06:16 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x38000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:06:16 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX]) [ 939.234477] EXT4-fs (sda): test_dummy_encryption option not supported [ 939.243985] EXT4-fs (sda): test_dummy_encryption option not supported [ 939.297669] 9pnet: Insufficient options for proto=fd [ 956.040656] 9pnet: Insufficient options for proto=fd 03:06:33 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000300, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:06:33 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:06:33 executing program 5: syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:06:33 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:06:33 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x7ffffffff000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:06:33 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX]) 03:06:33 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYRESHEX=r1]) 03:06:33 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:06:33 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 13) [ 956.094456] EXT4-fs (sda): test_dummy_encryption option not supported [ 956.109221] EXT4-fs (sda): test_dummy_encryption option not supported [ 956.116612] 9pnet: Insufficient options for proto=fd 03:06:33 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:06:33 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:06:33 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYRESHEX=r1]) [ 956.156657] 9pnet: Insufficient options for proto=fd 03:06:33 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 956.167467] 9pnet: Insufficient options for proto=fd [ 956.202817] 9pnet: Insufficient options for proto=fd 03:06:33 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:06:33 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYRESHEX=r1]) 03:06:33 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x5000000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 956.231644] FAULT_INJECTION: forcing a failure. [ 956.231644] name failslab, interval 1, probability 0, space 0, times 0 [ 956.235027] CPU: 0 PID: 7156 Comm: syz-executor.3 Not tainted 5.10.165 #1 [ 956.236377] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 956.238036] Call Trace: [ 956.238566] dump_stack+0x107/0x167 [ 956.239302] should_fail.cold+0x5/0xa [ 956.240158] ? create_object.isra.0+0x3a/0xa20 [ 956.241193] should_failslab+0x5/0x20 [ 956.242037] kmem_cache_alloc+0x5b/0x360 [ 956.242946] create_object.isra.0+0x3a/0xa20 [ 956.243919] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 956.245067] __kmalloc_track_caller+0x177/0x3c0 [ 956.246099] ? trace_probe_init+0x284/0x4e0 [ 956.247074] kstrdup+0x36/0x70 [ 956.247793] trace_probe_init+0x284/0x4e0 [ 956.248720] alloc_trace_kprobe+0x2ce/0x510 [ 956.249682] ? __startup_64+0x7/0x3b0 [ 956.250520] ? __startup_64+0x7/0x3b0 [ 956.251372] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 956.252570] ? __startup_64+0x7/0x3b0 [ 956.253418] ? __startup_64+0x7/0x3b0 [ 956.254262] create_local_trace_kprobe+0x4c/0x3b0 [ 956.255345] perf_kprobe_init+0x18c/0x280 [ 956.256160] 9pnet: Insufficient options for proto=fd [ 956.256272] perf_kprobe_event_init+0xf8/0x1c0 [ 956.257866] perf_try_init_event+0x130/0x570 [ 956.258855] perf_event_alloc.part.0+0xd96/0x2b30 [ 956.259943] __do_sys_perf_event_open+0x580/0x2cb0 [ 956.261061] ? lapic_timer_set_periodic+0x60/0x60 [ 956.262131] ? perf_event_set_output+0x5b0/0x5b0 [ 956.262317] 9pnet: Insufficient options for proto=fd [ 956.263183] ? tick_program_event+0xa8/0x140 [ 956.263214] ? __startup_64+0x7/0x3b0 [ 956.265588] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 956.266755] ? syscall_enter_from_user_mode+0x1d/0x50 [ 956.267916] do_syscall_64+0x33/0x40 [ 956.268749] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 956.269902] RIP: 0033:0x7fd37ad89b19 [ 956.270727] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 956.274812] RSP: 002b:00007fd3782ff188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 956.276501] RAX: ffffffffffffffda RBX: 00007fd37ae9cf60 RCX: 00007fd37ad89b19 [ 956.278086] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 956.279663] RBP: 00007fd3782ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 956.281015] 9pnet: Insufficient options for proto=fd [ 956.281247] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 956.281260] R13: 00007fff559d5caf R14: 00007fd3782ff300 R15: 0000000000022000 [ 956.292071] EXT4-fs (sda): test_dummy_encryption option not supported [ 956.297421] EXT4-fs (sda): test_dummy_encryption option not supported 03:06:49 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:06:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000900, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:06:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:06:50 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 14) 03:06:50 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:06:50 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x6000000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:06:50 executing program 5: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r1, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:06:50 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESHEX=r1]) [ 973.002763] 9pnet: Insufficient options for proto=fd [ 973.006593] cgroup: fork rejected by pids controller in /syz7 [ 973.010193] EXT4-fs (sda): test_dummy_encryption option not supported [ 973.018127] 9pnet: Insufficient options for proto=fd [ 973.023267] 9pnet: Insufficient options for proto=fd [ 973.027085] EXT4-fs (sda): test_dummy_encryption option not supported 03:06:50 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:06:50 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 973.094677] FAULT_INJECTION: forcing a failure. [ 973.094677] name failslab, interval 1, probability 0, space 0, times 0 [ 973.097633] CPU: 1 PID: 7212 Comm: syz-executor.3 Not tainted 5.10.165 #1 [ 973.099008] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 973.100665] Call Trace: [ 973.101208] dump_stack+0x107/0x167 [ 973.101948] should_fail.cold+0x5/0xa [ 973.102715] ? traceprobe_set_print_fmt+0x5a/0xd0 [ 973.103687] ? traceprobe_set_print_fmt+0x5a/0xd0 [ 973.104665] should_failslab+0x5/0x20 [ 973.105499] __kmalloc+0x72/0x3f0 [ 973.106324] traceprobe_set_print_fmt+0x5a/0xd0 [ 973.107407] create_local_trace_kprobe+0x1ca/0x3b0 [ 973.108557] perf_kprobe_init+0x18c/0x280 03:06:50 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESHEX=r1]) [ 973.109556] perf_kprobe_event_init+0xf8/0x1c0 [ 973.110794] perf_try_init_event+0x130/0x570 [ 973.111832] perf_event_alloc.part.0+0xd96/0x2b30 [ 973.112970] __do_sys_perf_event_open+0x580/0x2cb0 [ 973.114141] ? finish_task_switch+0x126/0x5d0 [ 973.115192] ? __switch_to_asm+0x3a/0x60 [ 973.116153] ? perf_event_set_output+0x5b0/0x5b0 [ 973.117295] ? __startup_64+0x7/0x3b0 [ 973.118213] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 973.119451] ? syscall_enter_from_user_mode+0x1d/0x50 [ 973.120675] do_syscall_64+0x33/0x40 [ 973.121575] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 973.122782] RIP: 0033:0x7fd37ad89b19 [ 973.123665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 973.127540] RSP: 002b:00007fd3782ff188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 973.129054] RAX: ffffffffffffffda RBX: 00007fd37ae9cf60 RCX: 00007fd37ad89b19 [ 973.130475] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 973.131893] RBP: 00007fd3782ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 973.133322] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 973.134729] R13: 00007fff559d5caf R14: 00007fd3782ff300 R15: 0000000000022000 03:06:50 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:06:50 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x7000000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:06:50 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:06:50 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 973.273363] 9pnet: Insufficient options for proto=fd [ 973.276452] 9pnet: Insufficient options for proto=fd 03:06:50 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x6, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 973.328837] EXT4-fs (sda): test_dummy_encryption option not supported [ 973.332240] EXT4-fs (sda): test_dummy_encryption option not supported [ 973.360353] 9pnet: Insufficient options for proto=fd [ 973.396542] 9pnet: Insufficient options for proto=fd 03:07:06 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20001000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:07:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x21000000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:07:06 executing program 5: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r1, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:07:06 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:07:06 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 15) 03:07:06 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESHEX=r1]) 03:07:06 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:07:06 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x7, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:07:06 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 989.546819] 9pnet: Insufficient options for proto=fd [ 989.554286] 9pnet: Insufficient options for proto=fd [ 989.576601] 9pnet: Insufficient options for proto=fd [ 989.588661] EXT4-fs (sda): test_dummy_encryption option not supported [ 989.602680] EXT4-fs (sda): test_dummy_encryption option not supported [ 989.604510] FAULT_INJECTION: forcing a failure. [ 989.604510] name failslab, interval 1, probability 0, space 0, times 0 [ 989.606812] CPU: 1 PID: 7357 Comm: syz-executor.3 Not tainted 5.10.165 #1 [ 989.607630] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 989.608597] Call Trace: [ 989.608915] dump_stack+0x107/0x167 [ 989.609351] should_fail.cold+0x5/0xa [ 989.609823] ? create_object.isra.0+0x3a/0xa20 [ 989.610362] should_failslab+0x5/0x20 [ 989.610817] kmem_cache_alloc+0x5b/0x360 [ 989.611302] create_object.isra.0+0x3a/0xa20 [ 989.611818] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 989.612432] __kmalloc+0x16e/0x3f0 [ 989.612866] traceprobe_set_print_fmt+0x5a/0xd0 [ 989.613436] create_local_trace_kprobe+0x1ca/0x3b0 [ 989.614049] perf_kprobe_init+0x18c/0x280 [ 989.614573] perf_kprobe_event_init+0xf8/0x1c0 [ 989.615135] perf_try_init_event+0x130/0x570 [ 989.615678] perf_event_alloc.part.0+0xd96/0x2b30 [ 989.616285] __do_sys_perf_event_open+0x580/0x2cb0 [ 989.616891] ? lapic_timer_set_periodic+0x60/0x60 [ 989.617489] ? perf_event_set_output+0x5b0/0x5b0 [ 989.618044] ? tick_program_event+0xa8/0x140 [ 989.618581] ? __startup_64+0x7/0x3b0 [ 989.619051] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 989.619689] ? syscall_enter_from_user_mode+0x1d/0x50 [ 989.620317] do_syscall_64+0x33/0x40 [ 989.620769] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 989.621397] RIP: 0033:0x7fd37ad89b19 [ 989.621858] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 989.624076] RSP: 002b:00007fd3782ff188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 989.624996] RAX: ffffffffffffffda RBX: 00007fd37ae9cf60 RCX: 00007fd37ad89b19 [ 989.625859] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 989.626729] RBP: 00007fd3782ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 989.627604] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 989.628475] R13: 00007fff559d5caf R14: 00007fd3782ff300 R15: 0000000000022000 03:07:06 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:07:06 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0xc, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:07:06 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:07:06 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfd', @ANYRESHEX=r1]) 03:07:06 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 989.708457] 9pnet: Insufficient options for proto=fd [ 989.717185] 9pnet: Insufficient options for proto=fd 03:07:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e000000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:07:06 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x300, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 989.761743] EXT4-fs (sda): test_dummy_encryption option not supported [ 989.768271] EXT4-fs (sda): test_dummy_encryption option not supported [ 989.778712] 9pnet: Insufficient options for proto=fd [ 989.783968] 9pnet: Insufficient options for proto=fd [ 989.796364] 9pnet: Insufficient options for proto=fd 03:07:22 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfd', @ANYRESHEX=r1]) 03:07:22 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 16) 03:07:22 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20001020, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:07:22 executing program 5: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r1, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:07:22 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x500, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:07:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x40000000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:07:22 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0xc, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1005.409789] EXT4-fs (sda): test_dummy_encryption option not supported [ 1005.416412] 9pnet: Insufficient options for proto=fd 03:07:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1005.427645] EXT4-fs (sda): test_dummy_encryption option not supported [ 1005.431442] 9pnet: Insufficient options for proto=fd [ 1005.458324] 9pnet: Insufficient options for proto=fd 03:07:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8cffffff, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:07:22 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfd', @ANYRESHEX=r1]) 03:07:22 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:07:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:07:22 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x600, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 1005.602341] 9pnet: Insufficient options for proto=fd [ 1005.615361] EXT4-fs (sda): test_dummy_encryption option not supported [ 1005.620472] 9pnet: Insufficient options for proto=fd [ 1005.633827] 9pnet: Insufficient options for proto=fd [ 1005.635945] FAULT_INJECTION: forcing a failure. [ 1005.635945] name failslab, interval 1, probability 0, space 0, times 0 [ 1005.639455] CPU: 0 PID: 7414 Comm: syz-executor.3 Not tainted 5.10.165 #1 [ 1005.640794] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1005.642420] Call Trace: [ 1005.642944] dump_stack+0x107/0x167 [ 1005.643664] should_fail.cold+0x5/0xa [ 1005.644413] ? create_object.isra.0+0x3a/0xa20 [ 1005.645309] should_failslab+0x5/0x20 [ 1005.646071] kmem_cache_alloc+0x5b/0x360 [ 1005.646875] create_object.isra.0+0x3a/0xa20 [ 1005.647749] kmemleak_alloc_percpu+0xa0/0x100 [ 1005.648651] pcpu_alloc+0x4e2/0x12f0 [ 1005.649418] perf_trace_event_init+0x376/0x9c0 [ 1005.650351] perf_kprobe_init+0x1c5/0x280 [ 1005.651185] perf_kprobe_event_init+0xf8/0x1c0 [ 1005.652096] perf_try_init_event+0x130/0x570 [ 1005.652975] perf_event_alloc.part.0+0xd96/0x2b30 [ 1005.653961] __do_sys_perf_event_open+0x580/0x2cb0 [ 1005.654951] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1005.655909] ? perf_event_set_output+0x5b0/0x5b0 [ 1005.656843] ? wait_for_completion_io+0x270/0x270 [ 1005.657820] ? __startup_64+0x7/0x3b0 [ 1005.658591] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1005.659629] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1005.660656] do_syscall_64+0x33/0x40 [ 1005.661397] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1005.662416] RIP: 0033:0x7fd37ad89b19 [ 1005.663155] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1005.666788] RSP: 002b:00007fd3782ff188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1005.668296] RAX: ffffffffffffffda RBX: 00007fd37ae9cf60 RCX: 00007fd37ad89b19 [ 1005.669717] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1005.671127] RBP: 00007fd3782ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1005.672539] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1005.673965] R13: 00007fff559d5caf R14: 00007fd3782ff300 R15: 0000000000022000 [ 1005.687448] EXT4-fs (sda): test_dummy_encryption option not supported [ 1021.985868] EXT4-fs (sda): test_dummy_encryption option not supported 03:07:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20002000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:07:39 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x700, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:07:39 executing program 5: r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r1, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:07:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:07:39 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno', @ANYRESHEX=r1]) 03:07:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:07:39 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 17) 03:07:39 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xae0b0000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 1021.991402] EXT4-fs (sda): test_dummy_encryption option not supported [ 1022.002523] FAULT_INJECTION: forcing a failure. [ 1022.002523] name failslab, interval 1, probability 0, space 0, times 0 [ 1022.003891] CPU: 0 PID: 7449 Comm: syz-executor.3 Not tainted 5.10.165 #1 [ 1022.004636] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1022.005531] Call Trace: [ 1022.005845] dump_stack+0x107/0x167 [ 1022.006250] should_fail.cold+0x5/0xa [ 1022.006658] ? create_object.isra.0+0x3a/0xa20 [ 1022.007165] should_failslab+0x5/0x20 [ 1022.007584] kmem_cache_alloc+0x5b/0x360 [ 1022.008028] ? alloc_aggr_kprobe+0x41/0x190 [ 1022.008502] create_object.isra.0+0x3a/0xa20 [ 1022.008980] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1022.009538] kmem_cache_alloc_trace+0x151/0x360 [ 1022.010058] alloc_aggr_kprobe+0x41/0x190 [ 1022.010510] register_kprobe+0x6be/0x13d0 [ 1022.010957] ? __startup_64+0x7/0x3b0 [ 1022.011381] __register_trace_kprobe+0x26a/0x2d0 [ 1022.011891] create_local_trace_kprobe+0x1e6/0x3b0 [ 1022.012421] perf_kprobe_init+0x18c/0x280 [ 1022.012875] perf_kprobe_event_init+0xf8/0x1c0 [ 1022.013372] perf_try_init_event+0x130/0x570 [ 1022.013870] perf_event_alloc.part.0+0xd96/0x2b30 [ 1022.014402] __do_sys_perf_event_open+0x580/0x2cb0 [ 1022.014831] 9pnet: Insufficient options for proto=fd [ 1022.014961] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1022.014975] ? perf_event_set_output+0x5b0/0x5b0 [ 1022.014984] ? wait_for_completion_io+0x270/0x270 [ 1022.015004] ? __startup_64+0x7/0x3b0 [ 1022.018024] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1022.018584] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1022.019146] do_syscall_64+0x33/0x40 [ 1022.019546] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1022.019980] 9pnet: Insufficient options for proto=fd [ 1022.020091] RIP: 0033:0x7fd37ad89b19 [ 1022.020112] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1022.023448] RSP: 002b:00007fd3782ff188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1022.024259] RAX: ffffffffffffffda RBX: 00007fd37ae9cf60 RCX: 00007fd37ad89b19 [ 1022.025029] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1022.025799] RBP: 00007fd3782ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1022.026564] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1022.027333] R13: 00007fff559d5caf R14: 00007fd3782ff300 R15: 0000000000022000 03:07:39 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xca1, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:07:39 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xf6ffffff, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:07:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:07:39 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno', @ANYRESHEX=r1]) [ 1022.110311] EXT4-fs (sda): test_dummy_encryption option not supported [ 1022.114733] EXT4-fs (sda): test_dummy_encryption option not supported 03:07:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:07:39 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x1020, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:07:39 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xffffe000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 1022.183345] 9pnet: Insufficient options for proto=fd 03:07:39 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 18) [ 1022.217893] EXT4-fs (sda): test_dummy_encryption option not supported [ 1022.236508] EXT4-fs (sda): test_dummy_encryption option not supported [ 1022.294780] FAULT_INJECTION: forcing a failure. [ 1022.294780] name failslab, interval 1, probability 0, space 0, times 0 [ 1022.296875] CPU: 0 PID: 7491 Comm: syz-executor.3 Not tainted 5.10.165 #1 [ 1022.297612] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1022.298520] Call Trace: [ 1022.298813] dump_stack+0x107/0x167 [ 1022.299209] should_fail.cold+0x5/0xa [ 1022.299622] ? create_object.isra.0+0x3a/0xa20 [ 1022.300124] should_failslab+0x5/0x20 [ 1022.300536] kmem_cache_alloc+0x5b/0x360 [ 1022.300991] create_object.isra.0+0x3a/0xa20 [ 1022.301483] kmemleak_alloc_percpu+0xa0/0x100 [ 1022.301973] pcpu_alloc+0x4e2/0x12f0 [ 1022.302404] perf_trace_event_init+0x376/0x9c0 [ 1022.302901] perf_kprobe_init+0x1c5/0x280 [ 1022.303356] perf_kprobe_event_init+0xf8/0x1c0 [ 1022.303853] perf_try_init_event+0x130/0x570 [ 1022.304334] perf_event_alloc.part.0+0xd96/0x2b30 [ 1022.304863] __do_sys_perf_event_open+0x580/0x2cb0 [ 1022.305413] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1022.305955] ? perf_event_set_output+0x5b0/0x5b0 [ 1022.306470] ? wait_for_completion_io+0x270/0x270 [ 1022.307011] ? __startup_64+0x7/0x3b0 [ 1022.307448] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1022.308036] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1022.308605] do_syscall_64+0x33/0x40 [ 1022.309029] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1022.309597] RIP: 0033:0x7fd37ad89b19 [ 1022.310018] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1022.312050] RSP: 002b:00007fd3782ff188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1022.312894] RAX: ffffffffffffffda RBX: 00007fd37ae9cf60 RCX: 00007fd37ad89b19 [ 1022.313681] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1022.314454] RBP: 00007fd3782ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1022.315243] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1022.316032] R13: 00007fff559d5caf R14: 00007fd3782ff300 R15: 0000000000022000 03:07:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:07:56 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xffffff8c, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:07:56 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno', @ANYRESHEX=r1]) 03:07:56 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:07:56 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 19) 03:07:56 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20002010, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:07:56 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x2000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:07:56 executing program 5: r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r1, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1039.482233] EXT4-fs (sda): test_dummy_encryption option not supported [ 1039.486783] EXT4-fs (sda): test_dummy_encryption option not supported [ 1039.497318] 9pnet: Insufficient options for proto=fd 03:07:56 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x2010, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:07:56 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xfffffff6, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:07:56 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYBLOB=',wfdno=', @ANYRESHEX=r0]) 03:07:56 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:07:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1039.616231] EXT4-fs (sda): test_dummy_encryption option not supported [ 1039.623718] EXT4-fs (sda): test_dummy_encryption option not supported [ 1039.631518] FAULT_INJECTION: forcing a failure. [ 1039.631518] name failslab, interval 1, probability 0, space 0, times 0 [ 1039.633299] CPU: 0 PID: 7617 Comm: syz-executor.3 Not tainted 5.10.165 #1 [ 1039.634112] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1039.635079] Call Trace: [ 1039.635394] dump_stack+0x107/0x167 [ 1039.635838] should_fail.cold+0x5/0xa [ 1039.636293] ? create_object.isra.0+0x3a/0xa20 [ 1039.636832] ? create_object.isra.0+0x3a/0xa20 [ 1039.637379] should_failslab+0x5/0x20 [ 1039.637840] kmem_cache_alloc+0x5b/0x360 [ 1039.638331] ? mark_held_locks+0x9e/0xe0 [ 1039.638814] create_object.isra.0+0x3a/0xa20 [ 1039.639343] kmemleak_alloc_percpu+0xa0/0x100 [ 1039.639896] pcpu_alloc+0x4e2/0x12f0 [ 1039.640370] perf_trace_event_init+0x376/0x9c0 [ 1039.640947] perf_kprobe_init+0x1c5/0x280 [ 1039.641483] perf_kprobe_event_init+0xf8/0x1c0 [ 1039.642086] perf_try_init_event+0x130/0x570 [ 1039.642653] perf_event_alloc.part.0+0xd96/0x2b30 [ 1039.643271] __do_sys_perf_event_open+0x580/0x2cb0 [ 1039.643906] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1039.644528] ? perf_event_set_output+0x5b0/0x5b0 [ 1039.645138] ? wait_for_completion_io+0x270/0x270 [ 1039.645758] ? __startup_64+0x7/0x3b0 [ 1039.646263] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1039.646935] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1039.647598] do_syscall_64+0x33/0x40 [ 1039.648078] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1039.648721] RIP: 0033:0x7fd37ad89b19 [ 1039.649202] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1039.651530] RSP: 002b:00007fd3782ff188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1039.652429] RAX: ffffffffffffffda RBX: 00007fd37ae9cf60 RCX: 00007fd37ad89b19 [ 1039.653323] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1039.654195] RBP: 00007fd3782ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1039.655029] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1039.655948] R13: 00007fff559d5caf R14: 00007fd3782ff300 R15: 0000000000022000 [ 1039.672561] 9pnet: Insufficient options for proto=fd 03:07:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:07:56 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:07:56 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xa10c, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:07:56 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1000000000000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:07:56 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 20) [ 1039.803880] EXT4-fs (sda): test_dummy_encryption option not supported [ 1039.816912] EXT4-fs (sda): test_dummy_encryption option not supported [ 1039.828727] FAULT_INJECTION: forcing a failure. [ 1039.828727] name failslab, interval 1, probability 0, space 0, times 0 [ 1039.830068] CPU: 0 PID: 7650 Comm: syz-executor.3 Not tainted 5.10.165 #1 [ 1039.830756] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1039.831589] Call Trace: [ 1039.831899] dump_stack+0x107/0x167 [ 1039.832280] should_fail.cold+0x5/0xa [ 1039.832672] ? selinux_perf_event_alloc+0x43/0x190 [ 1039.833176] should_failslab+0x5/0x20 [ 1039.833563] kmem_cache_alloc_trace+0x55/0x360 [ 1039.834027] ? perf_kprobe_init+0x1f9/0x280 [ 1039.834485] selinux_perf_event_alloc+0x43/0x190 [ 1039.834968] security_perf_event_alloc+0x46/0xa0 [ 1039.835502] perf_event_alloc.part.0+0x1877/0x2b30 [ 1039.836017] __do_sys_perf_event_open+0x580/0x2cb0 [ 1039.836548] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1039.837064] ? perf_event_set_output+0x5b0/0x5b0 [ 1039.837565] ? wait_for_completion_io+0x270/0x270 [ 1039.838116] ? __startup_64+0x7/0x3b0 [ 1039.838543] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1039.839111] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1039.839662] do_syscall_64+0x33/0x40 [ 1039.840071] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1039.840629] RIP: 0033:0x7fd37ad89b19 [ 1039.841037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1039.843060] RSP: 002b:00007fd3782ff188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1039.843883] RAX: ffffffffffffffda RBX: 00007fd37ae9cf60 RCX: 00007fd37ad89b19 [ 1039.844658] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1039.845424] RBP: 00007fd3782ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1039.846182] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1039.846974] R13: 00007fff559d5caf R14: 00007fd3782ff300 R15: 0000000000022000 03:08:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0xc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:08:14 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xedc0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:08:14 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:08:14 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYBLOB=',wfdno=', @ANYRESHEX=r0]) 03:08:14 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8000000000000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:08:14 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x2f000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:08:14 executing program 5: r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r1, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:08:14 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 21) [ 1057.037221] EXT4-fs (sda): test_dummy_encryption option not supported [ 1057.060141] EXT4-fs (sda): test_dummy_encryption option not supported [ 1057.091233] 9pnet: Insufficient options for proto=fd 03:08:14 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x80000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:08:14 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xe0ffff00000000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:08:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:08:14 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:08:14 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYBLOB=',wfdno=', @ANYRESHEX=r0]) [ 1057.284277] 9pnet: Insufficient options for proto=fd [ 1057.302631] EXT4-fs (sda): test_dummy_encryption option not supported 03:08:14 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x7ffffffff000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:08:14 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xe0ffff, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 1057.329095] EXT4-fs (sda): test_dummy_encryption option not supported [ 1057.361391] FAULT_INJECTION: forcing a failure. [ 1057.361391] name failslab, interval 1, probability 0, space 0, times 0 [ 1057.364230] CPU: 1 PID: 7767 Comm: syz-executor.3 Not tainted 5.10.165 #1 [ 1057.365741] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1057.367619] Call Trace: [ 1057.368243] dump_stack+0x107/0x167 [ 1057.369082] should_fail.cold+0x5/0xa [ 1057.369952] ? create_object.isra.0+0x3a/0xa20 [ 1057.371002] should_failslab+0x5/0x20 [ 1057.371863] kmem_cache_alloc+0x5b/0x360 [ 1057.372794] create_object.isra.0+0x3a/0xa20 [ 1057.373793] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1057.374961] kmem_cache_alloc_trace+0x151/0x360 [ 1057.376030] selinux_perf_event_alloc+0x43/0x190 [ 1057.377118] security_perf_event_alloc+0x46/0xa0 [ 1057.378197] perf_event_alloc.part.0+0x1877/0x2b30 [ 1057.379357] __do_sys_perf_event_open+0x580/0x2cb0 [ 1057.380489] ? perf_event_set_output+0x5b0/0x5b0 [ 1057.381564] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1057.382757] ? __startup_64+0x7/0x3b0 [ 1057.383632] ? perf_bp_event+0x1d0/0x1d0 [ 1057.384570] do_syscall_64+0x33/0x40 [ 1057.385415] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1057.386585] RIP: 0033:0x7fd37ad89b19 [ 1057.387452] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1057.391591] RSP: 002b:00007fd3782ff188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1057.393297] RAX: ffffffffffffffda RBX: 00007fd37ae9cf60 RCX: 00007fd37ad89b19 [ 1057.394904] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1057.396503] RBP: 00007fd3782ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1057.398108] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1057.399718] R13: 00007fff559d5caf R14: 00007fd3782ff300 R15: 0000000000022000 03:08:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:08:14 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0xc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:08:14 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0]) 03:08:14 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x100000000000000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 1057.490837] 9pnet: Insufficient options for proto=fd 03:08:14 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x1000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:08:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1057.559633] EXT4-fs (sda): test_dummy_encryption option not supported [ 1057.583479] EXT4-fs (sda): test_dummy_encryption option not supported [ 1057.643725] 9pnet: Insufficient options for proto=fd 03:08:29 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x2000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:08:29 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:08:29 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:08:29 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0]) 03:08:29 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x200000000000000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:08:29 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 22) 03:08:29 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:08:29 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1072.249956] 9pnet: Insufficient options for proto=fd [ 1072.266736] EXT4-fs (sda): test_dummy_encryption option not supported [ 1072.268174] 9pnet: Insufficient options for proto=fd [ 1072.281381] 9pnet: Insufficient options for proto=fd [ 1072.290909] EXT4-fs (sda): test_dummy_encryption option not supported 03:08:29 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x3000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:08:29 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:08:29 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0]) 03:08:29 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1072.420117] 9pnet: Insufficient options for proto=fd 03:08:29 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x300000000000000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 1072.455570] 9pnet: Insufficient options for proto=fd [ 1072.464243] 9pnet: Insufficient options for proto=fd 03:08:29 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1072.526406] EXT4-fs (sda): test_dummy_encryption option not supported 03:08:29 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1072.558583] EXT4-fs (sda): test_dummy_encryption option not supported [ 1072.581505] 9pnet_virtio: no channels available for device 9p [ 1072.691195] FAULT_INJECTION: forcing a failure. [ 1072.691195] name failslab, interval 1, probability 0, space 0, times 0 [ 1072.696135] CPU: 1 PID: 8041 Comm: syz-executor.3 Not tainted 5.10.165 #1 [ 1072.697622] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1072.699353] Call Trace: [ 1072.699996] dump_stack+0x107/0x167 [ 1072.700874] should_fail.cold+0x5/0xa [ 1072.701787] ? __d_alloc+0x2a/0x990 [ 1072.702678] ? __d_alloc+0x2a/0x990 [ 1072.703440] should_failslab+0x5/0x20 [ 1072.704228] kmem_cache_alloc+0x5b/0x360 [ 1072.705093] __d_alloc+0x2a/0x990 [ 1072.705918] d_alloc_pseudo+0x19/0x70 [ 1072.706725] alloc_file_pseudo+0xce/0x250 [ 1072.707610] ? alloc_file+0x5a0/0x5a0 [ 1072.708415] ? security_perf_event_alloc+0x79/0xa0 [ 1072.709445] ? ctx_sched_out+0xa00/0xa00 [ 1072.710423] anon_inode_getfile+0xc8/0x1f0 [ 1072.711321] __do_sys_perf_event_open+0xf5d/0x2cb0 [ 1072.712356] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1072.713520] ? perf_event_set_output+0x5b0/0x5b0 [ 1072.714522] ? wait_for_completion_io+0x270/0x270 [ 1072.715602] ? __startup_64+0x7/0x3b0 [ 1072.716516] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1072.717719] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1072.718979] do_syscall_64+0x33/0x40 [ 1072.719833] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1072.721006] RIP: 0033:0x7fd37ad89b19 [ 1072.721904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1072.726150] RSP: 002b:00007fd3782ff188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1072.727856] RAX: ffffffffffffffda RBX: 00007fd37ae9cf60 RCX: 00007fd37ad89b19 [ 1072.729284] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1072.730738] RBP: 00007fd3782ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1072.732177] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1072.733627] R13: 00007fff559d5caf R14: 00007fd3782ff300 R15: 0000000000022000 [ 1090.358775] 9pnet_virtio: no channels available for device 9p 03:08:47 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x4000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:08:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:08:47 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:08:47 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:08:47 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:08:47 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x400000000000000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:08:47 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:08:47 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 23) [ 1090.377193] EXT4-fs (sda): test_dummy_encryption option not supported [ 1090.379214] 9pnet: Insufficient options for proto=fd 03:08:47 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x5000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 1090.394689] EXT4-fs (sda): test_dummy_encryption option not supported 03:08:47 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x500000000000000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:08:47 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:08:47 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1090.510189] 9pnet: Insufficient options for proto=fd [ 1090.515526] 9pnet: Insufficient options for proto=fd 03:08:47 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1090.573227] FAULT_INJECTION: forcing a failure. [ 1090.573227] name failslab, interval 1, probability 0, space 0, times 0 [ 1090.576019] CPU: 1 PID: 8193 Comm: syz-executor.3 Not tainted 5.10.165 #1 [ 1090.577437] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1090.579149] Call Trace: [ 1090.579710] dump_stack+0x107/0x167 [ 1090.580448] should_fail.cold+0x5/0xa [ 1090.580981] 9pnet_virtio: no channels available for device 9p [ 1090.581254] ? create_object.isra.0+0x3a/0xa20 [ 1090.582786] EXT4-fs (sda): test_dummy_encryption option not supported [ 1090.583231] should_failslab+0x5/0x20 [ 1090.583257] kmem_cache_alloc+0x5b/0x360 [ 1090.583283] create_object.isra.0+0x3a/0xa20 [ 1090.586886] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1090.587919] kmem_cache_alloc+0x159/0x360 [ 1090.588772] __d_alloc+0x2a/0x990 [ 1090.589484] ? irqentry_enter+0x26/0x60 [ 1090.590306] d_alloc_pseudo+0x19/0x70 [ 1090.591088] alloc_file_pseudo+0xce/0x250 [ 1090.591934] ? alloc_file+0x5a0/0x5a0 [ 1090.592730] anon_inode_getfile+0xc8/0x1f0 [ 1090.593598] __do_sys_perf_event_open+0xf5d/0x2cb0 [ 1090.594614] ? lapic_timer_set_periodic+0x60/0x60 [ 1090.595610] ? perf_event_set_output+0x5b0/0x5b0 [ 1090.596584] ? tick_program_event+0xa8/0x140 [ 1090.597490] ? __startup_64+0x7/0x3b0 [ 1090.598286] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1090.599379] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1090.600437] do_syscall_64+0x33/0x40 [ 1090.601209] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1090.602255] RIP: 0033:0x7fd37ad89b19 [ 1090.603040] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1090.606834] RSP: 002b:00007fd3782ff188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1090.608409] RAX: ffffffffffffffda RBX: 00007fd37ae9cf60 RCX: 00007fd37ad89b19 [ 1090.609880] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1090.611377] RBP: 00007fd3782ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1090.612841] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1090.614321] R13: 00007fff559d5caf R14: 00007fd3782ff300 R15: 0000000000022000 [ 1090.619143] EXT4-fs (sda): test_dummy_encryption option not supported 03:08:47 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x6000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:08:47 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:08:47 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1090.734688] 9pnet: Insufficient options for proto=fd [ 1090.757682] 9pnet: Insufficient options for proto=fd [ 1090.760740] 9pnet_virtio: no channels available for device 9p 03:09:04 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:09:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x600000000000000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:09:04 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1107.424705] 9pnet_virtio: no channels available for device 9p [ 1107.434306] EXT4-fs (sda): test_dummy_encryption option not supported 03:09:04 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:09:04 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:09:04 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x7000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:09:04 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 24) 03:09:04 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1107.458278] EXT4-fs (sda): test_dummy_encryption option not supported [ 1107.460324] 9pnet: Insufficient options for proto=fd [ 1107.464333] 9pnet: Insufficient options for proto=fd 03:09:04 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:09:04 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:09:04 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:09:04 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:09:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x700000000000000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:09:04 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x20000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 1107.561592] 9pnet_virtio: no channels available for device 9p [ 1107.606613] EXT4-fs (sda): test_dummy_encryption option not supported [ 1107.613442] EXT4-fs (sda): test_dummy_encryption option not supported [ 1107.651214] 9pnet: Insufficient options for proto=fd [ 1107.660358] 9pnet: Insufficient options for proto=fd [ 1107.682838] FAULT_INJECTION: forcing a failure. [ 1107.682838] name failslab, interval 1, probability 0, space 0, times 0 [ 1107.684590] CPU: 0 PID: 8344 Comm: syz-executor.3 Not tainted 5.10.165 #1 [ 1107.685471] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1107.686553] Call Trace: [ 1107.686905] dump_stack+0x107/0x167 [ 1107.687388] should_fail.cold+0x5/0xa [ 1107.687885] ? __alloc_file+0x21/0x320 [ 1107.688403] should_failslab+0x5/0x20 [ 1107.688911] kmem_cache_alloc+0x5b/0x360 [ 1107.689460] __alloc_file+0x21/0x320 [ 1107.689947] alloc_empty_file+0x6d/0x170 [ 1107.690485] alloc_file+0x59/0x5a0 [ 1107.690963] alloc_file_pseudo+0x16a/0x250 [ 1107.691514] ? alloc_file+0x5a0/0x5a0 [ 1107.692012] ? security_perf_event_alloc+0x79/0xa0 [ 1107.692637] ? ctx_sched_out+0xa00/0xa00 [ 1107.693187] anon_inode_getfile+0xc8/0x1f0 [ 1107.693724] __do_sys_perf_event_open+0xf5d/0x2cb0 [ 1107.694376] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1107.695012] ? perf_event_set_output+0x5b0/0x5b0 [ 1107.695609] ? wait_for_completion_io+0x270/0x270 [ 1107.696251] ? __startup_64+0x7/0x3b0 [ 1107.696738] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1107.697430] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1107.698102] do_syscall_64+0x33/0x40 [ 1107.698602] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1107.699285] RIP: 0033:0x7fd37ad89b19 [ 1107.699754] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1107.702050] RSP: 002b:00007fd3782ff188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1107.703025] RAX: ffffffffffffffda RBX: 00007fd37ae9cf60 RCX: 00007fd37ad89b19 [ 1107.703963] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1107.704868] RBP: 00007fd3782ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1107.705758] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1107.706641] R13: 00007fff559d5caf R14: 00007fd3782ff300 R15: 0000000000022000 03:09:20 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:09:20 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x9, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:09:20 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:09:20 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 25) 03:09:20 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2100000000000000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:09:20 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:09:21 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x20100000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:09:21 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:09:21 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x8cffffff, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 1123.967715] EXT4-fs (sda): test_dummy_encryption option not supported [ 1123.975071] 9pnet: Could not find request transport: fd0x0000000000000003 [ 1123.978776] EXT4-fs (sda): test_dummy_encryption option not supported 03:09:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x111, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:09:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:09:21 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:09:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:09:21 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1124.078625] FAULT_INJECTION: forcing a failure. [ 1124.078625] name failslab, interval 1, probability 0, space 0, times 0 [ 1124.081730] CPU: 1 PID: 8380 Comm: syz-executor.3 Not tainted 5.10.165 #1 [ 1124.082585] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1124.083620] Call Trace: [ 1124.083959] dump_stack+0x107/0x167 [ 1124.084420] should_fail.cold+0x5/0xa [ 1124.084898] ? create_object.isra.0+0x3a/0xa20 [ 1124.085467] ? create_object.isra.0+0x3a/0xa20 [ 1124.086035] should_failslab+0x5/0x20 [ 1124.086516] kmem_cache_alloc+0x5b/0x360 [ 1124.087031] create_object.isra.0+0x3a/0xa20 [ 1124.087580] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1124.088253] kmem_cache_alloc+0x159/0x360 [ 1124.088774] __alloc_file+0x21/0x320 [ 1124.089265] alloc_empty_file+0x6d/0x170 [ 1124.089770] alloc_file+0x59/0x5a0 [ 1124.090256] alloc_file_pseudo+0x16a/0x250 [ 1124.090776] ? alloc_file+0x5a0/0x5a0 [ 1124.091299] ? ctx_sched_out+0xa00/0xa00 [ 1124.091806] anon_inode_getfile+0xc8/0x1f0 [ 1124.092362] __do_sys_perf_event_open+0xf5d/0x2cb0 [ 1124.092969] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1124.093596] ? perf_event_set_output+0x5b0/0x5b0 [ 1124.094204] ? wait_for_completion_io+0x270/0x270 [ 1124.094834] ? __startup_64+0x7/0x3b0 [ 1124.095336] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1124.096019] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1124.096676] do_syscall_64+0x33/0x40 [ 1124.097157] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1124.097811] RIP: 0033:0x7fd37ad89b19 [ 1124.098293] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1124.100549] RSP: 002b:00007fd3782ff188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1124.101531] RAX: ffffffffffffffda RBX: 00007fd37ae9cf60 RCX: 00007fd37ad89b19 [ 1124.102416] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1124.103317] RBP: 00007fd3782ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1124.104185] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1124.105057] R13: 00007fff559d5caf R14: 00007fd3782ff300 R15: 0000000000022000 [ 1124.120538] EXT4-fs (sda): test_dummy_encryption option not supported [ 1124.129902] EXT4-fs (sda): test_dummy_encryption option not supported 03:09:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x214, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1124.156258] 9pnet: Could not find request transport: fd0x0000000000000003 03:09:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000000000000000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:09:21 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xa10c0000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 1124.205331] EXT4-fs (sda): test_dummy_encryption option not supported [ 1124.216486] EXT4-fs (sda): test_dummy_encryption option not supported 03:09:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x10, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:09:39 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:09:39 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xc0ed0000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:09:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:09:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:09:39 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 26) 03:09:39 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:09:39 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 1142.519396] 9pnet: Insufficient options for proto=fd [ 1142.520630] EXT4-fs (sda): test_dummy_encryption option not supported [ 1142.528593] 9pnet: Insufficient options for proto=fd [ 1142.532020] EXT4-fs (sda): test_dummy_encryption option not supported [ 1142.538756] 9pnet: Could not find request transport: fd0x0000000000000003 03:09:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:09:39 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xae0b000000000000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 1142.596904] FAULT_INJECTION: forcing a failure. [ 1142.596904] name failslab, interval 1, probability 0, space 0, times 0 [ 1142.599384] CPU: 1 PID: 8547 Comm: syz-executor.3 Not tainted 5.10.165 #1 [ 1142.600246] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1142.601303] Call Trace: [ 1142.601644] dump_stack+0x107/0x167 [ 1142.602109] should_fail.cold+0x5/0xa [ 1142.602600] ? security_file_alloc+0x34/0x170 [ 1142.603171] should_failslab+0x5/0x20 [ 1142.603670] kmem_cache_alloc+0x5b/0x360 [ 1142.604190] security_file_alloc+0x34/0x170 [ 1142.604735] __alloc_file+0xb6/0x320 [ 1142.605213] alloc_empty_file+0x6d/0x170 [ 1142.605729] alloc_file+0x59/0x5a0 [ 1142.606187] alloc_file_pseudo+0x16a/0x250 [ 1142.606734] ? alloc_file+0x5a0/0x5a0 [ 1142.607239] ? ctx_sched_out+0xa00/0xa00 [ 1142.607779] anon_inode_getfile+0xc8/0x1f0 [ 1142.608331] __do_sys_perf_event_open+0xf5d/0x2cb0 [ 1142.608983] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1142.609586] ? perf_event_set_output+0x5b0/0x5b0 [ 1142.610201] ? wait_for_completion_io+0x270/0x270 [ 1142.610831] ? __startup_64+0x7/0x3b0 [ 1142.611335] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1142.612034] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1142.612709] do_syscall_64+0x33/0x40 [ 1142.613191] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1142.613851] RIP: 0033:0x7fd37ad89b19 [ 1142.614334] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1142.616720] RSP: 002b:00007fd3782ff188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1142.617701] RAX: ffffffffffffffda RBX: 00007fd37ae9cf60 RCX: 00007fd37ad89b19 [ 1142.618619] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1142.619559] RBP: 00007fd3782ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1142.620485] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1142.621410] R13: 00007fff559d5caf R14: 00007fd3782ff300 R15: 0000000000022000 03:09:39 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:09:39 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:09:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1142.647456] EXT4-fs (sda): test_dummy_encryption option not supported 03:09:39 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xf6ffffff, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 1142.654053] EXT4-fs (sda): test_dummy_encryption option not supported 03:09:39 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 1142.705438] 9pnet: Insufficient options for proto=fd 03:09:39 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xf9fdffff, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 1142.739213] EXT4-fs (sda): test_dummy_encryption option not supported [ 1142.746377] EXT4-fs (sda): test_dummy_encryption option not supported 03:09:54 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x111, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:09:54 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:09:54 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:09:54 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:09:54 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 27) [ 1157.530963] EXT4-fs (sda): test_dummy_encryption option not supported 03:09:54 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:09:54 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x300, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:09:54 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xffffe000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 1157.556765] EXT4-fs (sda): test_dummy_encryption option not supported 03:09:54 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xfffffdf9, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 1157.584487] 9pnet: Insufficient options for proto=fd 03:09:54 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x3, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:09:54 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x214, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:09:54 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:09:54 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1157.773712] EXT4-fs (sda): test_dummy_encryption option not supported [ 1157.783074] 9pnet: Insufficient options for proto=fd [ 1157.783582] EXT4-fs (sda): test_dummy_encryption option not supported 03:09:54 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:09:54 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xffffff8c, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:09:54 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1157.952411] FAULT_INJECTION: forcing a failure. [ 1157.952411] name failslab, interval 1, probability 0, space 0, times 0 [ 1157.955246] CPU: 1 PID: 8689 Comm: syz-executor.3 Not tainted 5.10.165 #1 [ 1157.956618] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1157.958265] Call Trace: [ 1157.958797] dump_stack+0x107/0x167 [ 1157.959523] should_fail.cold+0x5/0xa [ 1157.960298] ? create_object.isra.0+0x3a/0xa20 [ 1157.961207] should_failslab+0x5/0x20 [ 1157.961962] kmem_cache_alloc+0x5b/0x360 [ 1157.962766] ? percpu_ref_put_many.constprop.0+0x4e/0x100 [ 1157.963865] create_object.isra.0+0x3a/0xa20 [ 1157.964738] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1157.965749] kmem_cache_alloc+0x159/0x360 [ 1157.966585] security_file_alloc+0x34/0x170 [ 1157.967447] __alloc_file+0xb6/0x320 [ 1157.968212] alloc_empty_file+0x6d/0x170 [ 1157.969023] alloc_file+0x59/0x5a0 [ 1157.969738] alloc_file_pseudo+0x16a/0x250 [ 1157.970594] ? alloc_file+0x5a0/0x5a0 [ 1157.971353] ? security_perf_event_alloc+0x79/0xa0 [ 1157.972333] ? ctx_sched_out+0xa00/0xa00 [ 1157.973142] anon_inode_getfile+0xc8/0x1f0 [ 1157.973987] __do_sys_perf_event_open+0xf5d/0x2cb0 [ 1157.974976] ? perf_event_set_output+0x5b0/0x5b0 [ 1157.975057] 9pnet: Insufficient options for proto=fd [ 1157.975913] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1157.975939] ? __startup_64+0x7/0x3b0 [ 1157.975986] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1157.980150] do_syscall_64+0x33/0x40 [ 1157.980968] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1157.982087] RIP: 0033:0x7fd37ad89b19 [ 1157.982904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1157.986910] RSP: 002b:00007fd3782ff188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1157.988583] RAX: ffffffffffffffda RBX: 00007fd37ae9cf60 RCX: 00007fd37ad89b19 [ 1157.990146] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1157.991720] RBP: 00007fd3782ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1157.993281] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1157.994830] R13: 00007fff559d5caf R14: 00007fd3782ff300 R15: 0000000000022000 [ 1172.653430] EXT4-fs (sda): test_dummy_encryption option not supported [ 1172.656801] EXT4-fs (sda): test_dummy_encryption option not supported 03:10:09 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x900, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:10:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:10:09 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 28) 03:10:09 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:10:09 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:10:09 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xfffffff6, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:10:09 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:10:09 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:10:09 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xedc000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 1172.696551] 9pnet: Insufficient options for proto=fd 03:10:09 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:10:09 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x5, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:10:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:10:09 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1172.879220] EXT4-fs (sda): test_dummy_encryption option not supported [ 1172.882309] 9pnet: Insufficient options for proto=fd [ 1172.890081] EXT4-fs (sda): test_dummy_encryption option not supported 03:10:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:10:10 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x8000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 1173.132581] FAULT_INJECTION: forcing a failure. [ 1173.132581] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1173.135266] CPU: 1 PID: 8856 Comm: syz-executor.3 Not tainted 5.10.165 #1 [ 1173.136645] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1173.138308] Call Trace: [ 1173.138844] dump_stack+0x107/0x167 [ 1173.139591] should_fail.cold+0x5/0xa [ 1173.140391] _copy_to_user+0x2e/0x180 [ 1173.141176] simple_read_from_buffer+0xcc/0x160 [ 1173.142126] proc_fail_nth_read+0x198/0x230 [ 1173.142993] ? proc_sessionid_read+0x230/0x230 [ 1173.143916] ? security_file_permission+0x24e/0x570 [ 1173.144933] ? proc_sessionid_read+0x230/0x230 [ 1173.145835] vfs_read+0x228/0x580 [ 1173.146551] ksys_read+0x12d/0x260 [ 1173.147263] ? vfs_write+0xa30/0xa30 [ 1173.148032] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1173.149075] do_syscall_64+0x33/0x40 [ 1173.149829] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1173.150850] RIP: 0033:0x7fd37ad3c69c [ 1173.151592] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1173.155252] RSP: 002b:00007fd3782ff170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1173.156784] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007fd37ad3c69c [ 1173.158211] RDX: 000000000000000f RSI: 00007fd3782ff1e0 RDI: 0000000000000004 [ 1173.159630] RBP: 00007fd3782ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1173.161093] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1173.162509] R13: 00007fff559d5caf R14: 00007fd3782ff300 R15: 0000000000022000 03:10:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x1020, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:10:26 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:10:26 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x6, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:10:26 executing program 7: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:10:26 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:10:26 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xe0ffff00000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:10:26 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:10:26 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x0) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1189.417157] EXT4-fs (sda): test_dummy_encryption option not supported 03:10:26 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x100000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 1189.445463] EXT4-fs (sda): test_dummy_encryption option not supported 03:10:26 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:10:26 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:10:26 executing program 7: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:10:26 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x7, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:10:26 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x200000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:10:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x2000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:10:26 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:10:26 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1189.711663] EXT4-fs (sda): test_dummy_encryption option not supported [ 1189.729823] EXT4-fs (sda): test_dummy_encryption option not supported 03:10:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x2010, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:10:44 executing program 7: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:10:44 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:10:44 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:10:44 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x0) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:10:44 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x300000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:10:44 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:10:44 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1207.230165] EXT4-fs (sda): test_dummy_encryption option not supported 03:10:44 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x400000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 1207.244206] EXT4-fs (sda): test_dummy_encryption option not supported 03:10:44 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:10:44 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x11e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:10:44 executing program 7: r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r1, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:10:44 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:10:44 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x21, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:10:44 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x500000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 1207.454401] EXT4-fs (sda): test_dummy_encryption option not supported [ 1207.531463] EXT4-fs (sda): test_dummy_encryption option not supported 03:10:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xedc0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:11:04 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:11:04 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:11:04 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:11:04 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:11:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:11:04 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x600000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:11:04 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x80000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:11:04 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x0) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:11:04 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x700000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 1227.623605] EXT4-fs (sda): test_dummy_encryption option not supported [ 1227.636385] EXT4-fs (sda): test_dummy_encryption option not supported 03:11:04 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:11:04 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3f9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:11:04 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:11:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x300, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:11:04 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x1000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:11:04 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1227.902748] EXT4-fs (sda): test_dummy_encryption option not supported [ 1227.914592] EXT4-fs (sda): test_dummy_encryption option not supported 03:11:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:11:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:11:21 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x2000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:11:21 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:11:21 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x2000000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:11:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x500, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:11:21 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:11:21 executing program 7: r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r1, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:11:22 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x2010000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 1245.001060] EXT4-fs (sda): test_dummy_encryption option not supported [ 1245.006212] EXT4-fs (sda): test_dummy_encryption option not supported 03:11:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:11:22 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x13, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:11:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x600, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:11:22 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x8cffffff00000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:11:22 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x11e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1245.176064] EXT4-fs (sda): test_dummy_encryption option not supported [ 1245.185584] EXT4-fs (sda): test_dummy_encryption option not supported 03:11:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:11:22 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:11:22 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xa10c000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:11:22 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x14, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:11:38 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:11:38 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x700, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:11:38 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x3000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:11:38 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x13, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:11:38 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x25, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:11:38 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xf6ffffff00000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:11:38 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:11:38 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3f9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1261.820041] EXT4-fs (sda): test_dummy_encryption option not supported 03:11:38 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xf9fdffff00000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 1261.836756] EXT4-fs (sda): test_dummy_encryption option not supported 03:11:38 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x111, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:11:38 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:11:38 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1e01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:11:38 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x0) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:11:38 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xbae, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:11:39 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='\nrans=fd,rfd', @ANYRESHEX]) [ 1262.053880] EXT4-fs (sda): test_dummy_encryption option not supported [ 1262.074370] EXT4-fs (sda): test_dummy_encryption option not supported 03:11:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1262.191367] 9pnet_virtio: no channels available for device 9p 03:11:55 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2100, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 1278.926190] 9pnet_virtio: no channels available for device 9p 03:11:55 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x9000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:11:55 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:11:55 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x0) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:11:55 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='\"rans=fd,rfd', @ANYRESHEX]) 03:11:55 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:11:55 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:11:55 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:11:56 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='%rans=fd,rfd', @ANYRESHEX]) [ 1278.955401] EXT4-fs (sda): test_dummy_encryption option not supported [ 1278.976700] EXT4-fs (sda): test_dummy_encryption option not supported 03:11:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1279.039849] 9pnet_virtio: no channels available for device 9p 03:11:56 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB=',rans=fd,rfd', @ANYRESHEX]) 03:11:56 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:11:56 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e00, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:11:56 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='\"rans=fd,rfd', @ANYRESHEX]) [ 1279.168879] 9pnet_virtio: no channels available for device 9p [ 1279.178381] EXT4-fs (sda): test_dummy_encryption option not supported [ 1279.183198] 9pnet_virtio: no channels available for device 9p [ 1279.188527] EXT4-fs (sda): test_dummy_encryption option not supported [ 1279.257121] 9pnet_virtio: no channels available for device 9p 03:12:15 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x10000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:12:15 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1e01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:12:15 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:12:15 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:12:15 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:12:15 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='t\nans=fd,rfd', @ANYRESHEX]) 03:12:15 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x77, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:12:15 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='\"rans=fd,rfd', @ANYRESHEX]) [ 1298.192228] EXT4-fs (sda): test_dummy_encryption option not supported [ 1298.196558] 9pnet_virtio: no channels available for device 9p [ 1298.198578] EXT4-fs (sda): test_dummy_encryption option not supported 03:12:15 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1298.235537] 9pnet_virtio: no channels available for device 9p [ 1298.239234] 9pnet_virtio: no channels available for device 9p 03:12:15 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='\"rans=fd,rfd', @ANYRESHEX]) [ 1298.284106] 9pnet_virtio: no channels available for device 9p 03:12:15 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xf903, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:12:15 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:12:15 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='t\"ans=fd,rfd', @ANYRESHEX]) 03:12:15 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xae0b, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 1298.337511] EXT4-fs (sda): test_dummy_encryption option not supported [ 1298.342614] EXT4-fs (sda): test_dummy_encryption option not supported 03:12:15 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1298.389193] 9pnet_virtio: no channels available for device 9p [ 1298.393103] 9pnet_virtio: no channels available for device 9p 03:12:31 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:12:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x20000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:12:31 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:12:31 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x111, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:12:31 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x80000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:12:31 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:12:31 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='t%ans=fd,rfd', @ANYRESHEX]) 03:12:31 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1314.372503] EXT4-fs (sda): test_dummy_encryption option not supported [ 1314.379587] 9pnet_virtio: no channels available for device 9p 03:12:31 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='t,ans=fd,rfd', @ANYRESHEX]) [ 1314.398378] EXT4-fs (sda): test_dummy_encryption option not supported 03:12:31 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1314.451800] 9pnet_virtio: no channels available for device 9p [ 1314.466432] 9pnet_virtio: no channels available for device 9p 03:12:31 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xf903, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:12:31 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xe0ffff, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:12:31 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tr\tns=fd,rfd', @ANYRESHEX]) 03:12:31 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1314.543263] EXT4-fs (sda): test_dummy_encryption option not supported [ 1314.553353] EXT4-fs (sda): test_dummy_encryption option not supported [ 1314.568571] 9pnet_virtio: no channels available for device 9p [ 1314.578265] 9pnet_virtio: no channels available for device 9p 03:12:31 executing program 7: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:12:31 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1000000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:12:31 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1314.662482] EXT4-fs (sda): test_dummy_encryption option not supported [ 1314.667207] EXT4-fs (sda): test_dummy_encryption option not supported 03:12:56 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:12:56 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tr\"ns=fd,rfd', @ANYRESHEX]) 03:12:56 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:12:56 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2000000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:12:56 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x111, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:12:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:12:56 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:12:56 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x20100000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1339.089546] 9pnet_virtio: no channels available for device 9p [ 1339.091868] EXT4-fs (sda): test_dummy_encryption option not supported [ 1339.098211] EXT4-fs (sda): test_dummy_encryption option not supported [ 1339.101209] 9pnet_virtio: no channels available for device 9p 03:12:56 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x3000000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:12:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:12:56 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tr,ns=fd,rfd', @ANYRESHEX]) 03:12:56 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1339.249081] 9pnet_virtio: no channels available for device 9p [ 1339.256684] EXT4-fs (sda): test_dummy_encryption option not supported [ 1339.260788] 9pnet_virtio: no channels available for device 9p [ 1339.269293] EXT4-fs (sda): test_dummy_encryption option not supported 03:12:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:12:56 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x8cffffff, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:13:12 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xc0ed0000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:13:12 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:13:12 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:13:12 executing program 7: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:13:12 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4000000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:13:12 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trcns=fd,rfd', @ANYRESHEX]) 03:13:12 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:13:12 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1355.414256] 9pnet_virtio: no channels available for device 9p 03:13:12 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1355.421693] EXT4-fs (sda): test_dummy_encryption option not supported [ 1355.434714] EXT4-fs (sda): test_dummy_encryption option not supported [ 1355.440226] 9pnet_virtio: no channels available for device 9p 03:13:12 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:13:12 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tra\ns=fd,rfd', @ANYRESHEX]) 03:13:12 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:13:12 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x5000000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 1355.623063] EXT4-fs (sda): test_dummy_encryption option not supported [ 1355.630235] EXT4-fs (sda): test_dummy_encryption option not supported [ 1355.635721] 9pnet_virtio: no channels available for device 9p [ 1355.641369] 9pnet_virtio: no channels available for device 9p 03:13:12 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xc000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:13:12 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x6000000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:13:12 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tra\"s=fd,rfd', @ANYRESHEX]) [ 1355.798429] 9pnet_virtio: no channels available for device 9p [ 1355.806187] 9pnet_virtio: no channels available for device 9p [ 1355.811563] EXT4-fs (sda): test_dummy_encryption option not supported [ 1355.834769] EXT4-fs (sda): test_dummy_encryption option not supported 03:13:27 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1e010000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:13:27 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xf6ffffff, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:13:27 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:13:27 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:13:27 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tra%s=fd,rfd', @ANYRESHEX]) 03:13:27 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x7000000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:13:27 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:13:27 executing program 7: r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r1, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1370.612835] 9pnet_virtio: no channels available for device 9p [ 1370.619607] 9pnet_virtio: no channels available for device 9p [ 1370.624368] EXT4-fs (sda): test_dummy_encryption option not supported [ 1370.640316] EXT4-fs (sda): test_dummy_encryption option not supported 03:13:27 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3f000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:13:27 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xc000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:13:27 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xf9fdffff, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:13:27 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:13:27 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tra,s=fd,rfd', @ANYRESHEX]) 03:13:27 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x21000000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 1370.760151] 9pnet_virtio: no channels available for device 9p [ 1370.766843] 9pnet_virtio: no channels available for device 9p 03:13:27 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tran\n=fd,rfd', @ANYRESHEX]) [ 1370.839974] EXT4-fs (sda): test_dummy_encryption option not supported [ 1370.859111] EXT4-fs (sda): test_dummy_encryption option not supported [ 1370.865618] 9pnet_virtio: no channels available for device 9p 03:13:27 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xffff0000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:13:27 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1e010000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1370.876489] 9pnet_virtio: no channels available for device 9p 03:13:27 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:13:43 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:13:43 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:13:43 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tran\"=fd,rfd', @ANYRESHEX]) 03:13:43 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e000000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:13:43 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:13:43 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x70000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1386.520388] 9pnet_virtio: no channels available for device 9p 03:13:43 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1386.534243] 9pnet_virtio: no channels available for device 9p [ 1386.538741] EXT4-fs (sda): test_dummy_encryption option not supported 03:13:43 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xfffffdf9, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1386.562527] EXT4-fs (sda): test_dummy_encryption option not supported 03:13:43 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xf9030000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:13:43 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x70000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:13:43 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tran%=fd,rfd', @ANYRESHEX]) 03:13:43 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x40000000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 1386.710145] 9pnet_virtio: no channels available for device 9p 03:13:43 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tran,=fd,rfd', @ANYRESHEX]) 03:13:43 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x6, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:13:43 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xffffff8c, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1386.809877] EXT4-fs (sda): test_dummy_encryption option not supported [ 1386.821179] EXT4-fs (sda): test_dummy_encryption option not supported 03:13:43 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xf9030000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1386.854531] 9pnet_virtio: no channels available for device 9p [ 1386.869856] 9pnet_virtio: no channels available for device 9p 03:13:59 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trand=fd,rfd', @ANYRESHEX]) 03:13:59 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8cffffff, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:13:59 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:13:59 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:13:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x6, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:13:59 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:13:59 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xfffffff6, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:13:59 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1402.603369] EXT4-fs (sda): test_dummy_encryption option not supported [ 1402.611636] 9pnet_virtio: no channels available for device 9p [ 1402.616553] 9pnet_virtio: no channels available for device 9p [ 1402.625289] EXT4-fs (sda): test_dummy_encryption option not supported 03:13:59 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:13:59 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0xc, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:13:59 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trano=fd,rfd', @ANYRESHEX]) 03:13:59 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:13:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:13:59 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xae0b0000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 1402.738186] 9pnet_virtio: no channels available for device 9p [ 1402.749246] 9pnet_virtio: no channels available for device 9p [ 1402.804613] EXT4-fs (sda): test_dummy_encryption option not supported 03:13:59 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tranu=fd,rfd', @ANYRESHEX]) [ 1402.814393] EXT4-fs (sda): test_dummy_encryption option not supported 03:13:59 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xedc000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:13:59 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1402.876336] 9pnet_virtio: no channels available for device 9p [ 1402.885471] 9pnet_virtio: no channels available for device 9p 03:14:18 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:14:18 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:14:18 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x1000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:14:18 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tranx=fd,rfd', @ANYRESHEX]) 03:14:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xf6ffffff, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:14:18 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:14:18 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:14:18 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1421.572853] 9pnet_virtio: no channels available for device 9p 03:14:18 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans\nfd,rfd', @ANYRESHEX]) [ 1421.604044] 9pnet: Insufficient options for proto=fd [ 1421.611516] EXT4-fs (sda): test_dummy_encryption option not supported [ 1421.627655] EXT4-fs (sda): test_dummy_encryption option not supported 03:14:18 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:14:18 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:14:18 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:14:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xffffe000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 1421.753052] 9pnet_virtio: no channels available for device 9p [ 1421.760563] 9pnet_virtio: no channels available for device 9p 03:14:18 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:14:18 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x8000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:14:18 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0xff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1421.812859] EXT4-fs (sda): test_dummy_encryption option not supported [ 1421.817607] EXT4-fs (sda): test_dummy_encryption option not supported [ 1421.822482] 9pnet: Insufficient options for proto=fd 03:14:18 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:14:18 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans\"fd,rfd', @ANYRESHEX]) 03:14:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xffffff8c, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:14:18 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:14:18 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1421.965440] 9pnet_virtio: no channels available for device 9p [ 1421.977177] 9pnet_virtio: no channels available for device 9p [ 1422.009257] EXT4-fs (sda): test_dummy_encryption option not supported [ 1422.018847] EXT4-fs (sda): test_dummy_encryption option not supported 03:14:32 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:14:32 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:14:32 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xfffffff6, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:14:32 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:14:32 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:14:32 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans%fd,rfd', @ANYRESHEX]) 03:14:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x100000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:14:32 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1435.960241] 9pnet_virtio: no channels available for device 9p [ 1435.967094] EXT4-fs (sda): test_dummy_encryption option not supported [ 1435.971190] 9pnet_virtio: no channels available for device 9p [ 1435.973803] 9pnet: Insufficient options for proto=fd [ 1435.977446] EXT4-fs (sda): test_dummy_encryption option not supported 03:14:33 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:14:33 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:14:50 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:14:50 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans,fd,rfd', @ANYRESHEX]) 03:14:50 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:14:50 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:14:50 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0xc, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:14:50 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1000000000000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:14:50 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xc00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:14:50 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x200000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1453.620222] 9pnet_virtio: no channels available for device 9p 03:14:50 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=\nd,rfd', @ANYRESHEX]) [ 1453.643775] EXT4-fs (sda): test_dummy_encryption option not supported [ 1453.664801] EXT4-fs (sda): test_dummy_encryption option not supported 03:14:50 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:14:50 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1e01000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1453.794009] 9pnet: Could not find request transport: [ 1453.794009] d [ 1453.807477] 9pnet: Could not find request transport: [ 1453.807477] d 03:14:50 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8000000000000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:14:50 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x300000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:14:50 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xc00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1453.898443] EXT4-fs (sda): test_dummy_encryption option not supported [ 1453.918856] EXT4-fs (sda): test_dummy_encryption option not supported 03:14:50 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=\"d,rfd', @ANYRESHEX]) 03:14:51 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1454.022517] 9pnet: Could not find request transport: "d 03:15:06 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:15:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xe0ffff00000000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:15:06 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x900000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:15:06 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:15:06 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0xc, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:15:06 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=%d,rfd', @ANYRESHEX]) [ 1469.216831] EXT4-fs (sda): test_dummy_encryption option not supported [ 1469.224203] 9pnet: Could not find request transport: %d [ 1469.228285] EXT4-fs (sda): test_dummy_encryption option not supported [ 1469.230443] 9pnet: Could not find request transport: %d 03:15:06 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1e01000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:15:06 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:15:06 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=,d,rfd', @ANYRESHEX]) 03:15:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x100000000000000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:15:06 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xf903000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1469.362303] 9pnet_virtio: no channels available for device 9p 03:15:06 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:15:06 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=.d,rfd', @ANYRESHEX]) [ 1469.391721] EXT4-fs (sda): test_dummy_encryption option not supported 03:15:06 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1469.410439] EXT4-fs (sda): test_dummy_encryption option not supported 03:15:06 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0xc, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:15:06 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:15:06 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1469.472936] 9pnet: Could not find request transport: .d 03:15:06 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x1000000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1469.486257] 9pnet: Could not find request transport: .d 03:15:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x200000000000000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:15:06 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:15:06 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=/d,rfd', @ANYRESHEX]) [ 1469.595075] EXT4-fs (sda): test_dummy_encryption option not supported [ 1469.605228] EXT4-fs (sda): test_dummy_encryption option not supported [ 1469.611662] 9pnet: Could not find request transport: /d [ 1469.623159] 9pnet: Could not find request transport: /d 03:15:20 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:15:20 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:15:20 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x5, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:15:20 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:15:20 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x300000000000000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:15:20 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=f\n,rfd', @ANYRESHEX]) 03:15:20 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x2000000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:15:20 executing program 7: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0xc, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1483.938853] EXT4-fs (sda): test_dummy_encryption option not supported [ 1483.953386] EXT4-fs (sda): test_dummy_encryption option not supported [ 1483.954697] 9pnet: Could not find request transport: f [ 1483.954697] [ 1483.978603] 9pnet: Could not find request transport: f [ 1483.978603] 03:15:21 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=f\",rfd', @ANYRESHEX]) 03:15:21 executing program 7: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0xc, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:15:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x400000000000000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:15:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:15:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1484.086268] 9pnet: Could not find request transport: f" [ 1484.094544] cgroup: fork rejected by pids controller in /syz6 [ 1484.124615] EXT4-fs (sda): test_dummy_encryption option not supported [ 1484.142751] EXT4-fs (sda): test_dummy_encryption option not supported 03:15:34 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x6, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:15:34 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x2010000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:15:34 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:15:34 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=f%,rfd', @ANYRESHEX]) 03:15:34 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:15:34 executing program 7: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0xc, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:15:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x500000000000000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:15:34 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xf903000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1497.833573] 9pnet: Could not find request transport: f% [ 1497.846759] EXT4-fs (sda): test_dummy_encryption option not supported [ 1497.865338] EXT4-fs (sda): test_dummy_encryption option not supported 03:15:34 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:15:34 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0xc, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:15:34 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:15:35 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x8cffffff00000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:15:35 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x600000000000000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:15:35 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=f,,rfd', @ANYRESHEX]) 03:15:35 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x7, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:15:35 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1498.021234] 9pnet: Could not find request transport: f [ 1498.045278] EXT4-fs (sda): test_dummy_encryption option not supported [ 1498.049939] EXT4-fs (sda): test_dummy_encryption option not supported 03:15:50 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:15:50 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0xc, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:15:50 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x700000000000000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:15:50 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:15:50 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:15:50 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:15:50 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xf6ffffff00000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:15:50 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd\"rfd', @ANYRESHEX]) [ 1513.588033] EXT4-fs (sda): test_dummy_encryption option not supported [ 1513.605831] EXT4-fs (sda): test_dummy_encryption option not supported [ 1513.609107] 9pnet: Could not find request transport: fd"rfd0xffffffffffffffff 03:15:50 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:15:50 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:15:50 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:15:50 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2100000000000000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:15:50 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1513.770114] EXT4-fs (sda): test_dummy_encryption option not supported [ 1513.776538] EXT4-fs (sda): test_dummy_encryption option not supported 03:15:50 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:16:04 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:16:04 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:16:04 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd8rfd', @ANYRESHEX]) 03:16:05 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:16:05 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e00000000000000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:16:05 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:16:05 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xf9fdffff00000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:16:05 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1527.976492] EXT4-fs (sda): test_dummy_encryption option not supported [ 1527.990211] EXT4-fs (sda): test_dummy_encryption option not supported [ 1528.006878] 9pnet: Could not find request transport: fd8rfd0xffffffffffffffff 03:16:05 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0xc, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:16:05 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4000000000000000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:16:05 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:16:05 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x11e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1528.101649] EXT4-fs (sda): test_dummy_encryption option not supported [ 1528.112511] EXT4-fs (sda): test_dummy_encryption option not supported 03:16:05 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0xff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:16:05 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xffff000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:16:05 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:16:05 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:16:05 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0xc, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1528.219551] EXT4-fs (sda): test_dummy_encryption option not supported [ 1528.240618] EXT4-fs (sda): test_dummy_encryption option not supported 03:16:21 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:16:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:16:21 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:16:21 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,\nfd', @ANYRESHEX]) 03:16:21 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0xc, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:16:21 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='\"rans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:16:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xae0b000000000000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:16:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1544.590413] 9pnet: Insufficient options for proto=fd [ 1544.594013] EXT4-fs (sda): test_dummy_encryption option not supported [ 1544.597460] EXT4-fs (sda): test_dummy_encryption option not supported 03:16:21 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1544.632285] 9pnet_virtio: no channels available for device 9p 03:16:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:16:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:16:21 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1544.733393] EXT4-fs (sda): test_dummy_encryption option not supported [ 1544.747659] EXT4-fs (sda): test_dummy_encryption option not supported 03:16:21 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,\"fd', @ANYRESHEX]) 03:16:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1544.806322] 9pnet: Insufficient options for proto=fd 03:16:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc2e, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 1544.862818] EXT4-fs (sda): test_dummy_encryption option not supported [ 1544.871289] EXT4-fs (sda): test_dummy_encryption option not supported 03:16:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:16:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB=',rans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:16:39 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:16:39 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,%fd', @ANYRESHEX]) [ 1562.114392] 9pnet: Insufficient options for proto=fd [ 1562.130815] 9pnet_virtio: no channels available for device 9p [ 1562.152774] audit: type=1400 audit(1675048599.206:14): avc: denied { tracepoint } for pid=14323 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 03:16:39 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:16:39 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc4c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:16:39 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:16:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:16:39 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,,fd', @ANYRESHEX]) [ 1562.241572] 9pnet: Insufficient options for proto=fd 03:16:39 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc75, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:16:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:16:39 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:16:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x11e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:16:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='t\"ans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1562.445568] 9pnet_virtio: no channels available for device 9p 03:16:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:16:39 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,r\nd', @ANYRESHEX]) [ 1562.549401] 9pnet: Insufficient options for proto=fd [ 1579.654708] 9pnet_virtio: no channels available for device 9p 03:16:56 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:16:56 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:16:56 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,r\"d', @ANYRESHEX]) 03:16:56 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:16:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:16:56 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='t,ans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:16:56 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='\nest_dummy_encryption']) 03:16:56 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1579.677715] 9pnet: Insufficient options for proto=fd [ 1579.704194] EXT4-fs (sda): Unrecognized mount option " [ 1579.704194] est_dummy_encryption" or missing value [ 1579.734548] EXT4-fs (sda): Unrecognized mount option " [ 1579.734548] est_dummy_encryption" or missing value 03:16:56 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:16:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1e01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:16:56 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:16:56 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='\"est_dummy_encryption']) 03:16:56 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tr\"ns=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1579.893736] EXT4-fs (sda): Unrecognized mount option ""est_dummy_encryption" or missing value [ 1579.954220] EXT4-fs (sda): Unrecognized mount option ""est_dummy_encryption" or missing value 03:16:57 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,r%d', @ANYRESHEX]) 03:16:57 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1579.983667] 9pnet_virtio: no channels available for device 9p [ 1579.997286] 9pnet: Insufficient options for proto=fd [ 1596.536530] 9pnet: Insufficient options for proto=fd [ 1596.546519] 9pnet_virtio: no channels available for device 9p [ 1596.553271] EXT4-fs (sda): Unrecognized mount option "%est_dummy_encryption" or missing value [ 1596.573049] EXT4-fs (sda): Unrecognized mount option "%est_dummy_encryption" or missing value 03:17:13 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='%est_dummy_encryption']) 03:17:13 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:17:13 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:17:13 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:17:13 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tr,ns=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:17:13 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:17:13 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,r,d', @ANYRESHEX]) 03:17:13 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:17:13 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf903, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:17:13 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:17:13 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB=',est_dummy_encryption']) 03:17:13 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:17:13 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tra\"s=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:17:13 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,r.d', @ANYRESHEX]) [ 1596.808473] EXT4-fs (sda): Unrecognized mount option "est_dummy_encryption" or missing value 03:17:13 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1596.834249] EXT4-fs (sda): Unrecognized mount option "est_dummy_encryption" or missing value [ 1596.870860] 9pnet: Insufficient options for proto=fd [ 1596.874792] 9pnet_virtio: no channels available for device 9p 03:17:13 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:17:13 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='t\nst_dummy_encryption']) 03:17:13 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1597.032677] EXT4-fs (sda): Unrecognized mount option "t [ 1597.032677] st_dummy_encryption" or missing value [ 1597.064435] EXT4-fs (sda): Unrecognized mount option "t [ 1597.064435] st_dummy_encryption" or missing value 03:17:27 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:17:27 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tra,s=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:17:27 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:17:27 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,r/d', @ANYRESHEX]) 03:17:27 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='t\"st_dummy_encryption']) 03:17:27 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:17:27 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:17:27 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1610.259601] EXT4-fs (sda): Unrecognized mount option "t"st_dummy_encryption" or missing value [ 1610.264503] 9pnet_virtio: no channels available for device 9p [ 1610.268825] 9pnet: Insufficient options for proto=fd [ 1610.277460] EXT4-fs (sda): Unrecognized mount option "t"st_dummy_encryption" or missing value 03:17:27 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:17:27 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1e01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:17:27 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='t%st_dummy_encryption']) 03:17:27 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:17:27 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:17:27 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rf\n', @ANYRESHEX]) 03:17:27 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tran\"=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1610.504657] EXT4-fs (sda): Unrecognized mount option "t%st_dummy_encryption" or missing value [ 1610.532343] EXT4-fs (sda): Unrecognized mount option "t%st_dummy_encryption" or missing value [ 1610.585364] 9pnet: Insufficient options for proto=fd [ 1610.601714] 9pnet_virtio: no channels available for device 9p 03:17:27 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:17:43 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='t,st_dummy_encryption']) 03:17:43 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:17:43 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:17:43 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tra,s=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:17:43 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tran%=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:17:43 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rf\"', @ANYRESHEX]) 03:17:43 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0xc, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:17:43 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1626.554681] EXT4-fs (sda): Unrecognized mount option "t" or missing value [ 1626.563563] 9pnet_virtio: no channels available for device 9p [ 1626.569607] EXT4-fs (sda): Unrecognized mount option "t" or missing value [ 1626.572406] 9pnet_virtio: no channels available for device 9p [ 1626.574953] 9pnet: Insufficient options for proto=fd 03:17:43 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:17:43 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='te\nt_dummy_encryption']) 03:17:43 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:17:43 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:17:43 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1626.775750] EXT4-fs (sda): Unrecognized mount option "te [ 1626.775750] t_dummy_encryption" or missing value 03:17:43 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1626.787994] EXT4-fs (sda): Unrecognized mount option "te [ 1626.787994] t_dummy_encryption" or missing value 03:17:58 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf903, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:17:58 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:17:58 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:17:58 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1e010000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:17:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tran,=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:17:58 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rf%', @ANYRESHEX]) 03:17:58 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='te\"t_dummy_encryption']) 03:17:58 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0xff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1641.670819] EXT4-fs (sda): Unrecognized mount option "te"t_dummy_encryption" or missing value [ 1641.688326] 9pnet_virtio: no channels available for device 9p [ 1641.691871] EXT4-fs (sda): Unrecognized mount option "te"t_dummy_encryption" or missing value [ 1641.712668] 9pnet: Insufficient options for proto=fd 03:17:58 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='te#t_dummy_encryption']) 03:17:58 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1641.800052] EXT4-fs (sda): Unrecognized mount option "te#t_dummy_encryption" or missing value 03:17:58 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:17:58 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1641.808886] EXT4-fs (sda): Unrecognized mount option "te#t_dummy_encryption" or missing value 03:17:58 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:17:58 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='te%t_dummy_encryption']) [ 1641.917399] EXT4-fs (sda): Unrecognized mount option "te%t_dummy_encryption" or missing value [ 1641.929123] EXT4-fs (sda): Unrecognized mount option "te%t_dummy_encryption" or missing value 03:17:59 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rf,', @ANYRESHEX]) 03:17:59 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tranI=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:17:59 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1642.010708] 9pnet_virtio: no channels available for device 9p [ 1642.024051] 9pnet: Insufficient options for proto=fd 03:18:14 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x70000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:18:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:18:14 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x6, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:18:14 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='te*t_dummy_encryption']) 03:18:14 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:18:14 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:18:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) dup2(r0, r1) 03:18:14 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tranQ=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1657.918194] EXT4-fs (sda): Unrecognized mount option "te*t_dummy_encryption" or missing value [ 1657.921814] EXT4-fs (sda): Unrecognized mount option "te*t_dummy_encryption" or missing value [ 1657.926535] 9pnet_virtio: no channels available for device 9p [ 1657.927779] 9pnet: Insufficient options for proto=fd 03:18:15 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='te+t_dummy_encryption']) [ 1658.012406] EXT4-fs (sda): Unrecognized mount option "te+t_dummy_encryption" or missing value [ 1658.024538] EXT4-fs (sda): Unrecognized mount option "te+t_dummy_encryption" or missing value 03:18:15 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf9030000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:18:15 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:18:15 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:18:15 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tranR=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:18:15 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='te,t_dummy_encryption']) [ 1658.130408] 9pnet_virtio: no channels available for device 9p [ 1658.149494] EXT4-fs (sda): Unrecognized mount option "te" or missing value 03:18:15 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1658.155678] EXT4-fs (sda): Unrecognized mount option "te" or missing value 03:18:15 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='te*t_dummy_encryption']) 03:18:15 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:18:15 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='te-t_dummy_encryption']) 03:18:15 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:18:15 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tranS=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1658.261684] EXT4-fs (sda): Unrecognized mount option "te*t_dummy_encryption" or missing value [ 1658.276905] EXT4-fs (sda): Unrecognized mount option "te-t_dummy_encryption" or missing value [ 1658.281335] EXT4-fs (sda): Unrecognized mount option "te-t_dummy_encryption" or missing value [ 1658.306034] 9pnet_virtio: no channels available for device 9p 03:18:30 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:18:30 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tranT=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:18:30 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:18:30 executing program 6: ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000080)={0x16a, 0x12, &(0x7f0000000240)="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"}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x1c0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000000), 0x0) recvmsg$unix(r0, &(0x7f0000000940)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000840)=[{&(0x7f00000001c0)=""/33, 0x21}], 0x1, &(0x7f0000000880)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x40}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000980)={0x0, 0x0}) r5 = getpid() prlimit64(r5, 0x0, &(0x7f0000000000), 0x0) r6 = getpgid(r1) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000a00)=0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r8, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) recvmmsg$unix(r8, &(0x7f0000001740)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/113, 0x71}, {&(0x7f0000001100)=""/95, 0x5f}], 0x2, &(0x7f00000011c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x50}}, {{&(0x7f0000001240), 0x6e, &(0x7f0000001640)=[{&(0x7f00000012c0)=""/216, 0xd8}, {&(0x7f00000013c0)=""/150, 0x96}, {&(0x7f0000001480)=""/142, 0x8e}, {&(0x7f0000001540)=""/218, 0xda}], 0x4, &(0x7f0000001680)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}}], 0x2, 0x8000, &(0x7f00000017c0)={0x77359400}) clone3(&(0x7f0000000a80)={0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000180), {0x15}, &(0x7f0000000640)=""/70, 0x46, &(0x7f00000006c0)=""/201, &(0x7f0000000a40)=[r9, r2, r3, r1, r4, r5, r1, r6, 0x0, r7], 0xa, {r8}}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:18:30 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='te.t_dummy_encryption']) 03:18:30 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:18:30 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1673.263646] EXT4-fs (sda): Unrecognized mount option "te.t_dummy_encryption" or missing value 03:18:30 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1673.280792] 9pnet_virtio: no channels available for device 9p [ 1673.287167] EXT4-fs (sda): Unrecognized mount option "te.t_dummy_encryption" or missing value 03:18:30 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:18:30 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:18:30 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:18:30 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1e010000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:18:30 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r0, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[@sack_perm], 0x1) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r1, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000001080)={'wlan0\x00'}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trand', @ANYRESHEX]) [ 1673.491803] 9pnet_virtio: no channels available for device 9p [ 1688.702640] 9pnet_virtio: no channels available for device 9p 03:18:45 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:18:45 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:18:45 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:18:45 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[]) 03:18:45 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:18:45 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:18:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tranV=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:18:45 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='te0t_dummy_encryption']) [ 1688.729544] 9pnet_virtio: no channels available for device 9p [ 1688.738369] EXT4-fs (sda): Unrecognized mount option "te0t_dummy_encryption" or missing value [ 1688.754724] EXT4-fs (sda): Unrecognized mount option "te0t_dummy_encryption" or missing value 03:18:45 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:18:45 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='teXt_dummy_encryption']) 03:18:45 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:18:45 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080), 0x4c2000, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7472616e733d66642c726690161a80dd66d97bcaf838e69512aaa419684de855eeb5cfbc1002e4c6d928b3a91c9095384eb75367390f72d92a651b2b0e5856a9fe231cdf7482536a4d05000000311c39e419699160cb0d90569b954e2709741f9bb95d0f217fe5a1251ed5d189bfa505b3218a533eea7f15c1cc02021c583912fc6ec3b9656240c6232aa7cf949de924f12f86cbb60c57192477515c90fa07f95e787058190094c80d3b818f5d7bf26d6d1a5dfdc19909b6824b3ff64cce603ce25515bc74dfd206d7431f1962072c660c3eaf853815da348470031e21c0f24a52294338649ae16c0baefe1137160b81151bbb59023bfcb0631d4839792f468f687b1495557a491d9a35b5f420d4a90d69d3c426b77836f69068d6ca0da07176384db764c417b1e14da0c9b6879fb4e0b15f1bf90708d1ffdc64c63d6f65e11174", @ANYRESHEX]) [ 1688.978637] EXT4-fs (sda): Unrecognized mount option "teXt_dummy_encryption" or missing value 03:18:46 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tranb=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1689.007331] EXT4-fs (sda): Unrecognized mount option "teXt_dummy_encryption" or missing value [ 1689.015218] 9pnet: Insufficient options for proto=fd 03:18:46 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1689.119783] 9pnet_virtio: no channels available for device 9p 03:19:00 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x70000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:00 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trand=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:19:00 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:00 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='tect_dummy_encryption']) 03:19:00 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:00 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:19:00 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:19:00 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1703.695402] 9pnet: Insufficient options for proto=fd [ 1703.738354] EXT4-fs (sda): Unrecognized mount option "tect_dummy_encryption" or missing value [ 1703.740624] 9pnet_virtio: no channels available for device 9p [ 1703.752209] EXT4-fs (sda): Unrecognized mount option "tect_dummy_encryption" or missing value 03:19:00 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf9030000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:00 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:00 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:19:00 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:00 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='tedt_dummy_encryption']) 03:19:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000080)='./file1/file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0x154, 0xa, 0x6, 0x202, 0x0, 0x0, {0x2, 0x0, 0x1}, [@IPSET_ATTR_DATA={0x54, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0x7}, @IPSET_ATTR_CIDR2={0x5}, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}}}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10001}, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x2dc}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x9}]}, @IPSET_ATTR_ADT={0x24, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x15}}}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x54, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @loopback}}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz1\x00'}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @loopback}}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x20}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x8}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @dev={0xac, 0x14, 0x14, 0x3e}}}, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x200}, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x6}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x5}, @IPSET_ATTR_ADT={0x50, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAME={0x9, 0x12, 'syz1\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_COMMENT={0x7, 0x1a, '9p\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e21}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR={0x5, 0x3, 0x35}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e23}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PROTO={0x5, 0x7, 0x73}}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0x154}, 0x1, 0x0, 0x0, 0x840}, 0x40c0) 03:19:00 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1703.932891] EXT4-fs (sda): Unrecognized mount option "tedt_dummy_encryption" or missing value 03:19:00 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:01 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trang=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1703.955212] EXT4-fs (sda): Unrecognized mount option "tedt_dummy_encryption" or missing value 03:19:01 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1704.020877] 9pnet_virtio: no channels available for device 9p 03:19:01 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:18 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=,d,rfd', @ANYRESHEX]) 03:19:18 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0xc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='teit_dummy_encryption']) 03:19:18 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000240)={0x0, 0x0, 0x7, 0x0, '\x00', [{0x8, 0x1, 0x3, 0x0, 0x7f, 0x95b}, {0x8, 0x461, 0x95, 0x9, 0x8000, 0x2}], ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:19:18 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:18 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:18 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1721.783911] 9pnet: Insufficient options for proto=fd [ 1721.787057] 9pnet_virtio: no channels available for device 9p [ 1721.789292] EXT4-fs (sda): Unrecognized mount option "teit_dummy_encryption" or missing value 03:19:18 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trano=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1721.800734] 9pnet_virtio: no channels available for device 9p [ 1721.825577] EXT4-fs (sda): Unrecognized mount option "teit_dummy_encryption" or missing value 03:19:18 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:18 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1e01000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:18 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=,d,rfd', @ANYRESHEX]) 03:19:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='telt_dummy_encryption']) [ 1721.933598] perf: interrupt took too long (3202 > 3166), lowering kernel.perf_event_max_sample_rate to 62000 [ 1721.951407] 9pnet_virtio: no channels available for device 9p [ 1721.991116] EXT4-fs (sda): Unrecognized mount option "telt_dummy_encryption" or missing value 03:19:19 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tranq=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1722.003740] EXT4-fs (sda): Unrecognized mount option "telt_dummy_encryption" or missing value 03:19:19 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='^rans=fd,rfd', @ANYRESHEX]) 03:19:19 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:19:19 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:19 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=,d,rfd', @ANYRESHEX]) [ 1722.064190] 9pnet_virtio: no channels available for device 9p [ 1722.087383] 9pnet_virtio: no channels available for device 9p [ 1722.099341] 9pnet_virtio: no channels available for device 9p 03:19:34 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:34 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tranu=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:19:34 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:34 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f0000000080)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0xbd4}) 03:19:34 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='teot_dummy_encryption']) 03:19:34 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:34 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1737.340981] 9pnet: Insufficient options for proto=fd [ 1737.342763] EXT4-fs (sda): Unrecognized mount option "teot_dummy_encryption" or missing value [ 1737.356355] 9pnet_virtio: no channels available for device 9p [ 1737.357763] EXT4-fs (sda): Unrecognized mount option "teot_dummy_encryption" or missing value 03:19:34 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='tept_dummy_encryption']) 03:19:34 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:34 executing program 6: r0 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000100)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="7472616e733d666495e46664", @ANYRESHEX]) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x8, 0x2, 0x5, 0x2}, {0x7fff, 0x5, 0x8, 0x1}, {0x401, 0x4, 0x7f, 0x486}, {0xffff, 0x3, 0x6}]}) ioctl$VFAT_IOCTL_READDIR_BOTH(r1, 0x82307201, &(0x7f0000000240)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) [ 1737.525274] EXT4-fs (sda): Unrecognized mount option "tept_dummy_encryption" or missing value [ 1737.533767] EXT4-fs (sda): Unrecognized mount option "tept_dummy_encryption" or missing value 03:19:34 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:34 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0xff, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:34 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tranw=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1737.617355] 9pnet: Could not find request transport: fd•äfd0xffffffffffffffff [ 1737.658262] 9pnet_virtio: no channels available for device 9p 03:19:48 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf903000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tranx=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:19:48 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) write(r0, &(0x7f00000000c0)="9436ac7a3bd22c740d8786ebb8d115c837c3fa8b01c5e99cc07a57d995a5dcb732e70c207119a157268af7d9fe921e6b44830dd8", 0x34) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 1751.980140] 9pnet: Insufficient options for proto=fd 03:19:48 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='teut_dummy_encryption']) 03:19:48 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:49 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:19:49 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1752.005186] EXT4-fs (sda): Unrecognized mount option "teut_dummy_encryption" or missing value [ 1752.008712] 9pnet_virtio: no channels available for device 9p [ 1752.030707] EXT4-fs (sda): Unrecognized mount option "teut_dummy_encryption" or missing value 03:19:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1e01000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:49 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:19:49 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:49 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='text_dummy_encryption']) 03:19:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans\"fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:19:49 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:19:49 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r1, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) fcntl$dupfd(r0, 0x0, r1) [ 1752.250382] EXT4-fs (sda): Unrecognized mount option "text_dummy_encryption" or missing value [ 1752.263795] EXT4-fs (sda): Unrecognized mount option "text_dummy_encryption" or missing value 03:19:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1752.279026] 9pnet_virtio: no channels available for device 9p [ 1752.310464] 9pnet: Insufficient options for proto=fd 03:20:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) fchmod(r0, 0x89) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:20:04 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:20:04 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans,fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:20:04 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:20:04 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:20:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='tes\n_dummy_encryption']) 03:20:04 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:20:04 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1767.922886] 9pnet: Insufficient options for proto=fd [ 1767.958517] EXT4-fs (sda): Unrecognized mount option "tes [ 1767.958517] _dummy_encryption" or missing value [ 1767.962986] 9pnet_virtio: no channels available for device 9p [ 1767.978764] EXT4-fs (sda): Unrecognized mount option "tes [ 1767.978764] _dummy_encryption" or missing value 03:20:05 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:20:05 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:20:05 executing program 7: syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:20:05 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='tes\"_dummy_encryption']) 03:20:05 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:20:05 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:20:05 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) r0 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080), 0x0, &(0x7f0000000200)=ANY=[@ANYRES16=r0, @ANYRES16]) [ 1768.184985] EXT4-fs (sda): Unrecognized mount option "tes"_dummy_encryption" or missing value 03:20:05 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=\"d,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1768.210540] EXT4-fs (sda): Unrecognized mount option "tes"_dummy_encryption" or missing value [ 1768.283811] 9pnet: Could not find request transport: "d [ 1768.286593] 9pnet_virtio: no channels available for device ./file1 03:20:21 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x38000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:20:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf903000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:20:21 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:20:21 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:20:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:20:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='tes%_dummy_encryption']) 03:20:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) fcntl$addseals(r0, 0x409, 0xc) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:20:21 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=,d,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1784.247091] 9pnet: Insufficient options for proto=fd [ 1784.250894] 9pnet_virtio: no channels available for device 9p [ 1784.251885] EXT4-fs (sda): Unrecognized mount option "tes%_dummy_encryption" or missing value [ 1784.256805] EXT4-fs (sda): Unrecognized mount option "tes%_dummy_encryption" or missing value 03:20:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:20:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='tes,_dummy_encryption']) 03:20:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:20:21 executing program 7: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x6, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:20:21 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r0, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) openat(r0, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001080)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(r1, &(0x7f00000010c0)=@nfc_llcp, &(0x7f0000001140)=0x80, 0x80800) [ 1784.394148] EXT4-fs (sda): Unrecognized mount option "tes" or missing value [ 1784.405075] EXT4-fs (sda): Unrecognized mount option "tes" or missing value 03:20:21 executing program 7: r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r1, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:20:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test\ndummy_encryption']) 03:20:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:20:21 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:20:21 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=.d,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:20:21 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1784.538830] EXT4-fs (sda): Unrecognized mount option "test [ 1784.538830] dummy_encryption" or missing value [ 1784.550775] EXT4-fs (sda): Unrecognized mount option "test [ 1784.550775] dummy_encryption" or missing value [ 1784.552313] 9pnet: Could not find request transport: .d 03:20:35 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:20:35 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:20:35 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:20:35 executing program 6: openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x0, 0x185) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000080)=ANY=[]) 03:20:35 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test\"dummy_encryption']) 03:20:35 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=/d,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:20:35 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:20:35 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1798.124631] EXT4-fs (sda): Unrecognized mount option "test"dummy_encryption" or missing value [ 1798.125525] 9pnet: Could not find request transport: /d [ 1798.149434] EXT4-fs (sda): Unrecognized mount option "test"dummy_encryption" or missing value 03:20:35 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:20:35 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:20:51 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:20:51 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test%dummy_encryption']) 03:20:51 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:20:51 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:20:51 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,{&d', @ANYRESHEX, @ANYRESOCT=r0]) recvmsg(r1, &(0x7f00000007c0)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000280)=""/214, 0xd6}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/107, 0x6b}, {&(0x7f00000004c0)=""/47, 0x2f}, {&(0x7f0000000500)=""/146, 0x92}, {&(0x7f00000005c0)=""/192, 0xc0}], 0x6, &(0x7f0000000700)=""/159, 0x9f}, 0x2000) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000800)='./file1\x00', 0x1ee502, 0x0) renameat2(r2, &(0x7f0000000100)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x3) r3 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) dup(r3) 03:20:51 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=f\",rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:20:51 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:20:51 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1814.598606] EXT4-fs (sda): Unrecognized mount option "test%dummy_encryption" or missing value [ 1814.600231] 9pnet: Insufficient options for proto=fd [ 1814.604229] 9pnet: Could not find request transport: f" [ 1814.626426] EXT4-fs (sda): Unrecognized mount option "test%dummy_encryption" or missing value 03:20:51 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:20:51 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test,dummy_encryption']) 03:20:51 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:20:51 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:20:51 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:20:51 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=f,,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:20:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r1, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) r2 = accept$inet(r0, 0x0, &(0x7f0000001080)) ioctl$F2FS_IOC_FLUSH_DEVICE(r2, 0x4008f50a, &(0x7f00000010c0)={0xffff0000, 0x7}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 1814.864258] EXT4-fs (sda): Unrecognized mount option "test" or missing value 03:20:51 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1814.878784] EXT4-fs (sda): Unrecognized mount option "test" or missing value [ 1814.919648] EXT4-fs (sda): test_dummy_encryption option not supported [ 1814.942671] 9pnet: Could not find request transport: f [ 1814.950224] 9pnet: Insufficient options for proto=fd [ 1830.741801] 9pnet: Could not find request transport: fI [ 1830.743392] device lo entered promiscuous mode 03:21:07 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x111, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:21:07 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:21:07 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:21:07 executing program 6: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000180)={'ip6tnl0\x00', 0x0, 0x29, 0x3, 0x40, 0x2e0, 0x41, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x10, 0x7800, 0x6, 0x2}}) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000004800)={{0x1, 0x1, 0x18, r1, {0x5}}, './file1\x00'}) ioctl$sock_SIOCDELRT(r2, 0x890c, &(0x7f0000004840)={0x0, @llc={0x1a, 0x303, 0x80, 0x40, 0x4, 0x1, @remote}, @llc={0x1a, 0x13, 0x3f, 0x9a, 0x1, 0x7, @remote}, @isdn={0x22, 0x1, 0x3, 0x9, 0x6}, 0xc35b, 0x0, 0x0, 0x0, 0x27, 0x0, 0x0, 0x7, 0x3}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r4, 0x1, 0x6, @dev}, 0x10) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004680)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x7fffffff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4c7}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000240)="aa5a5e2fcf2b2e78ed889f517c5c07a27b13969bf668cfe18c2f184cf34cf9e41773a5e94cf4235347bf20a0cede8cd29329e096be751a100e12a823980fc72a885face2b7b6258713603ccc771924ebbf5a6a489b414a86f84509ad24d0b94f1fc7fb7c7676f7675b4048c8729b9198dcfb8e94d8b8e6271078cb7aee7501dae910c7a6f269d733012c0ad1a5f2a1ffd9f30b0a8329e79d76", 0x99}, {&(0x7f0000000300)="c707b9e557110f5f0d4ddb510ed65df08083163fb9d0b07f20e9f7124b489941380c41479b377245cadec1f03a4b47cd77af06f8a2221683253bd3fe267876f7ca3a760ef1a7e263463b8dc3fc2270b13a673bef6d49f78dff8f61c02a73a0271902536e34bee8474f3757748c4bbc2a4810f0d7c331b277230a37207e6ebf896d9cf3138c956439cf5c4ab28fcb8b54206ce286485cb283fe2395773ee177b13785928341d6c95029c0", 0xaa}], 0x2, &(0x7f00000003c0)=[@tclass={{0x14}}, @hopopts={{0x60, 0x29, 0x36, {0x0, 0x8, '\x00', [@jumbo={0xc2, 0x4, 0x3}, @jumbo={0xc2, 0x4, 0x4}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x2}, @hao={0xc9, 0x10, @private0}, @ra={0x5, 0x2, 0xf466}, @hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @enc_lim={0x4, 0x1, 0xbe}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x8}}, @dontfrag={{0x14, 0x29, 0x3e, 0x3}}, @pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, '\x00', 0x28}, r0}}}, @dstopts_2292={{0x158, 0x29, 0x4, {0x87, 0x27, '\x00', [@calipso={0x7, 0x10, {0x1, 0x2, 0x3, 0xfff7, [0xe]}}, @generic={0x1, 0xcd, "c79a83de8d2277942f45dcee76a0450a86f4589915801ebb4ad54a7e5a3c6b7a4e5af51bb1dee6864cd60f39b8564e7452b5d357a3ccc8244616c835a7b516cf39cd5a77a7bc1276cf32752b23ba5787cc129bd326bae79fe75058c41daf22f9d1301c5cd03974a45f81acda75f686c9d14b90d0f5358ec03fc7d87a12b061267b0d771ae65b2addd88e4fad0c6ffff1a5b324ee1fb06c0d87147d803b75f3cc8dec7e983de7d06a4acbd34b8c83d1e4c40863fe3b376bef93218a53384182834b0d271f8bda8a141873f827fa"}, @calipso={0x7, 0x58, {0x1, 0x14, 0x9, 0x40, [0x5, 0x5, 0x2, 0x1ff, 0x0, 0x7, 0x3fe000000000, 0xffffffff00000000, 0x2, 0x2]}}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x8}}], 0x240}}, {{&(0x7f0000000600)={0xa, 0x4e23, 0xffffffe0, @remote, 0x1a6}, 0x1c, &(0x7f0000000800)=[{&(0x7f0000000640)="973dc7610cc11fd535b12f4e18afc8c3c4ff85300f5fd3dac5571767513674bcc8c19f49120530f39f9fc3e170891f81d0920f0237d73ec4e410d9d96a0ac207e08d83b198af96a22a48347ff465c55f1c655a", 0x53}, {&(0x7f00000006c0)="8a7967459e0482935d93c07799de28016e068d8e83213677383765c5e8", 0x1d}, {&(0x7f0000000700)="0c8e88c6d804274f3e6359dd121b239e36b82b80d9f715d219ea03f2050e63e6820522686b7096154e80de5f1dbff5117dc047861c14022d2d8a4bee6087c4e5ed4a0f195ff54e4f54ef1074c502549b4e2507f87a72a3628d7295b315e1810b99e0ca6a7e9a43c7a4a971b725ce790bab9607c22482fe258cf4c1744e00dcb1b6da04d644def379b3c9e3fc2e34e8768cec82730efdfaace122d737c2dd6701dfa17a7ad8cc7bc5013de0646d1732c002b7c8d01ae52eebba524aea38347957e21f6940e4cd6765e2b99650b0", 0xcd}], 0x3, &(0x7f0000000940)=[@tclass={{0x14, 0x29, 0x43, 0x6}}, @hopopts_2292={{0x58, 0x29, 0x36, {0x62, 0x7, '\x00', [@jumbo={0xc2, 0x4, 0x101}, @pad1, @enc_lim={0x4, 0x1, 0x9}, @jumbo={0xc2, 0x4, 0x4}, @calipso={0x7, 0x28, {0x1, 0x8, 0x6, 0x7, [0x2, 0xff, 0x80000000, 0x7]}}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r4}}}, @dstopts={{0x68, 0x29, 0x37, {0x2c, 0x9, '\x00', [@padn={0x1, 0x2, [0x0, 0x0]}, @ra={0x5, 0x2, 0x3f74}, @generic={0x8, 0x2e, "487848378942c5e1a328c022db236f9e2ea9989641b6f79d9a01099884d67215e1da152fdbcbd795f7d8b4fb4244"}, @hao={0xc9, 0x10, @local}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x8001}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x8, 0x6, 0x0, 0x2b, 0x0, [@remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1]}}}, @tclass={{0x14, 0x29, 0x43, 0x10000}}, @dstopts_2292={{0xc8, 0x29, 0x4, {0x3c, 0x15, '\x00', [@generic={0x4, 0xa1, "05e5b5736e16e8925036a948755e97074f5dc2448502a5c961ea642ec587b432348a774f573a9e6888df54beae7cd9fdd58bd64f3a210ec6f1329f404b4663501fb2fa5ab5e3c820832803cdcb6da3df79f57245e6b9d69f60c0985edacd296f33d573876eb0e703edbc8f1c1b6d9914594cbfea5edc4659c19b13e70ca2a515cf8b5f5cff632c16f45c446ef98401d864118deb338e50bbce4de45908cf05fe15"}, @jumbo={0xc2, 0x4, 0x5}]}}}, @dstopts_2292={{0x20, 0x29, 0x4, {0x88, 0x0, '\x00', [@ra={0x5, 0x2, 0x3f}]}}}], 0x260}}, {{0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000840)="f2aac38ace120138fd2992c1b30d11aa17f80f14ed3566a04fd76e1d7c4d6c5f987961664a84e4cf5d20c71615b9a2c48ad9f9f4702858e2", 0x38}, {&(0x7f0000000bc0)="d9272f48d2df1210c20016d89bbc3f0a81cba78803b61238db55068dc83b80379ff5ad11edab5818dbc278ecf09719e66f0858c7cf5b9ec3f247710a29c4ff201b1278c7492864b787c8d0c45e8a7e7841e6b5c7a67af0efb67fa1330de0", 0x5e}, {&(0x7f0000000c40)="a9dc6d25ee5a529be781c381182a747d9d5f467f631d5a9737cf3615ccae3e7f7fbfe5256adb40c0b15c4e79034c523f2e25c47576c1dbb59f3041500482cfc5a2eb15ccc00cff2a224524f2baea162730225ff6dce0e2ab191035aedc42b877b1e2e6cfa6c706e29f12168bbc793a1e7babd0b650e37719d1850bc1b9f72a7c8925a74dd591a1df0ea0e219e8fd92f558b27bb4d8e0b0eba8106588f71d42a33a8457d06d236f3bab67c6f2e4a2b3e3af99452aadf542eb8ed7accf74713a4cc6217bcd543db7b8040374b4af6ec23570bc85ac7b94070e83e6b10c0cf41780c45d9b52b6a2cf659007d71d9a39c4c78ccf6b480e03482e3485673febd9354b5f331dd6c21a44cf588587e8804f2edd30f913166e64b8eaa236df86c69e2c1946fe4aaaad28a50fc96c59ad6523e8dce8079f39e4195719be87e725c93d6d60051f5763b6c2083e05bfe33babba6697e62513189a8b7aa30a9b3a9737a1a3edc690e2f754b6ad0b1a4de5a8364bf39f7b9e9e75ecc234a0f7f85ed5751a5681773c47e49e5c851d2ea0106b1db95b56937e82ecbbce16a2b872b16f051c8ce2b12700600de0b0b6eabd9c566d50b02b88ef3e881337de8536ac37386fef782da176d238d5707f10fe8f10a9f80633ed5ad7cb93c66352a4ed6aa3c48b1d8b3f83dd1b1d25ddfa529367b50e2dd40a2d3a6622262baf973f8ee8ea7039f812ebf6d5a14a5b1ec548440c21237ef55a01f2e736d4e8faf599d5e54ec269b7ee238b42e6be6f863f7b638f2777a0ac0d35720ecda648711bec81d3961dad863ffa55af51c79e9ba020e983e571a4417f5416cdc5d154a57988df38ccc353a1590f73534b0173ed276224ce1d53c1ac1e414d0c0f4515af4de4db5062b25674ca725f60c408502c83e6fc45716222c85984a63cb1bea57911254d6ff115eeed7ffd41a84a43f9bbf938e7dd656b5a1c43bc04101ddc40ef8ccac7206c799925c8620e6ebfe54f1a1a7e974c37f3b2aa0df3d9722d231b4d8a50950950caa02283bc130125a02567436045cf848cc11d13e4f2fe91f4fed6c9a262f9efad2c707745b192378f4a9bea42a754dacf12eddbc2853c004f3f9d0a541ff1db9595b94221226eb58b12a0b3fa9d4999fd312ced5fe010ef62527795c261159b346bb82dd1920d60834818d7abf459f13057714dcccac0f75fcae6c9d4a551c3d04bda8cde8734a387ec9874d10d67214d12827f8a08876aba652cd7ca990454e4f1eec5643f97b7bc6ebabe175135fec7d63f51b27afe99a921a845426de46a3b9f8f285fa4fea06880aeb717e531ab9dcf5484652355c1e5ce735e03d422759d0dfe09094ce6087193eefba717acc8a2c48cc44300ace4aca784ba1176f621ac0e082b852f2056cb7fa06bb8f0a6756e83fc79163a96eee06f3b09fbd3f63f89a84d00c40bf25f9fd4af8db460ff4f5dfedd9cff35ef1a4ac6292120eedf8c4abe8a1a7d385874d6c0bead08e32f9ad49cc8a79df8ee017bee6445a064400e251bbc6c703cfc2e153f4dca292a1724c80876e56838b4348c33df586593dfc92a286a5d44a16b0a527e902e0ee1c67541c6a5db7fc5be088c82e23249b65c2a8b0500a50accef45da41a4a73b59c17bf591fe2337720c3e002e89a740eae753ac4e153aa661cbc53844c1c82fc552550f7c1fe43e2c69d0f50efa369750b1f4ff3e2864f8b86f5634d2f5d683d1f17537492b3f56155b2c1d21e1d2d6f8795e1f178eff24a3c5b435d82b6ab756e8584375688dd2c2e1defc4491c6b928e2bb645b03fabbbe85d9e79c6973f1d9396299a6eb0a04d528ce9f8e607954d4cd79e882c63faa6ef4d56a64e1a7b86d25d33ef4cc7ef3f0667b8f234a0e431234fa3bf71f85ba9e1d8f27e231c48a70e9cdd0432ea05e6fcef02dec09f02d2219c4503980bc96fa6f447e281e22ffba6eaedb18042ce380a1bb49ef88e44effbd5b0afa08c7feed7b491b2c35dccf934f595bb7f260851bbc519851d7670950f4f5e6adbecfb645d290871805349c99db17aa1d9be10466592b901e0e966d818823a0e909fd6c72cff1bc8e82cb43fe72ff0682beb26d7f232abc61aabf6f8826d666250e8f7eeecc189ad8e0f8230bf641345f684179223d6ed6dd1e6dd89bc123f8d39dc731d0624a5faafca9abead4808ab8e0681e107f6aa85bfb6c48134ed66f97aff556ebdd9a628d8a0890019d703d754709405652a07cef1ff21eaf8fd2e1471f51ae144731fa2f8e03ffea87a27e377136bf518dfeff62ec2d9880af73751e43f3ab50ce6dc4dc79bd502d7177c22ed57ff18614ba0ba7493f11df47b86d663382643bf4777b089d90c87e9a91f8d2a2a6bfeceff6387f71d64110a174751823639c824ad191e61c00912074bdfe5d9227076b795fc467706ac87b620640147bdf837070aca9214d1d7733f6cae946c488c32a7b5b749ec1cc81a028fd040727c87e5cc5fd6b6009e61930031b67654946028b2dcd46248020e20b5fa3904a990fa345e875b397a64e322bf1d0a017b7dcf39ba0585859e093fa5dded4beb21cd8218d67b43d9e317e3e3a89861f9ad6050bb118fabb436061000a5fbc88cc746bad050b8779a75ad6490607d34749d5f2138ff343768cf6472ce2a6ecfe81322cf4452b749a68d6dd07d1e24919612848c8d41f6efc2556ce911ea65af9886d7feee55b7f1eec4f01ac36b286ac39e42772cbb6839bc517e1a2fc78d58917575d45dd7c16d96a44fb472add71b8a3b882d36a7277be9ad64923abe4c5f67e19292177b0f887e28a7025362a3e1e45415e5f252bba9b31059c1c348f00c5f20dc2763e749687aa7b905fd1fa84b5f767ade43bae5e4f43c712360d26eac92634ff8bd51bb4e54b581cb9be2209c02b2c9e75fc707893c12e13cfbb4e92baa914234fc38c5de6da2524926c5ce5567c65895845b82315e85ea1066510f0ab2e2a55f3d8c9b2d39c3b846df74c941bf10dee8eea74e165981532710a2a00a6e51107c276da53ee7236a132006230a4deea503d74b0d3cf95d51ef156a852e1c8567e33a56e81fb862de6cf2e8fe3cf4192add54086d86e3ddf6db03b0994cecc8a933bb9fcb1b32ac816cb2a9ff60dfa4d17aed2dc7b78c698dc7cf69d538ffb9764d2a2d83754385827779422a7f3ccfe0ab03531bba0d0229b4f6cee97a451c7a599549da6c339c2ce1ab7c687d36798cdaf6535ad16f980bca101466f9cd85a042f2e0d3f446b445832abcb24485c4d3c6b0534e01c55b620981bc4621e3c0baf0fe6a81a9ae1dea547c58638d87e32d74ecb1e01fca7a7a7c4bb6a60ed7e45e3e61d4224831ece77d10a807855f4752de020a510d653bc1e8fcc9adcdfb500b134765f27790be7475d62dbca175ec104a263ce32adcf0630fe10d521e3c1b70bdea428ee71001414587adcc7edb8cd622f4ba02ac55ce82ef12feb17b043ad3fb3e0c80080c8132874b80e50dea3be9e232ffd723ea972f4f971169d784026425dd94676e44ea49fae5f40b7b5b8435f39f210d45caa06e9451dee1c30614becf00cb550a8efd2cfd202f29bd089783a7050d7396cda1a64cb938d4f9f2bc4ddab2c7c0f175af4c7e67f73fe13555b2e6ea2a6cbda1ab567041770c2a261856eb41bfebcc2a7c5db57c259e3a75f9a6bd53aa1444c9f7dfbdad7c64c2be641a816c362a6ab77380678be3f1f58552b291f957c91674b310585f8f44a9e89f40102fbd58a5b2f7075ddb1d55b080b5476ada5eff2e9a71eb603acf495742c8211c82fc0b40dd2f4999d5bf62b9d484b0f5096c73ed6cfa11b79696a88f6170dc13af9fe73c601e055253ec30708be323b2928c12d9995fb85339fb8b535f0ab8114fd82ece5744ba4f55ba2bb7b629063b60dad150cb96d95f656b1227f0c367704a7740c5b8a91d518d501bd5dc20e212c77e4238d875d830bdb97c1685a1cb4f46d018a6335f1e68f6a8a9b49ed4373b087a8f5d5af3770be84d203faaab92dd046d9fa0332412cfb26bf648ea06c36a4e5d79e8ce54215484659fe356f0534bf72e1647d0e6e97b3a05e9ab3c4b4f10e4b70789f2c33d908bf2edbf8b2595b582cd5c1fdaba463b0501c3ca6ecc6600637dbf2df12500891a114f49714bb635d56bf89d3c74c667c8ae4cd14a604d1dce631bd5bb479b85407bbe3aae32c322d93ba4b5da4477326fae1c07d6b44eee1df0ad5c7821f7021c01ba3bd096f66b2884f3b3880dd58e80e6ad014f7f54de5e22f2fbceba549b4cb7c867d336e6f07dffb1f1621cdc610d21e9eda4d6e66c3a5d1396843b9830504ecb1010b02c201f47865eca1afd13b1a2b766426f83fe3f2df3f34d52aea58a50802db6f2fa04cf6fe8c44794fe5cfff3b88bb3d09f220e01b35a40a1c874aea42efc5da8c5d425935808e5eb414183be12987aea9768497ab4e3f9872392b40effec578a25f1d8a5a87d294f41a597bbe413053e0c8fdfef8afdbb312a87b2013bf9e2c5a7a7b05f39e99a5eda7caeb85bb53327f909efe9a0b2950c3263d43d610b4564e1a943e8ddc3494bbf27794261338d60d4cc7a92521978ea9cc6c1a447f4a726d47eab769650537f8fd22f71b23ae117f1c0ba27b38e25737e105dca4defd9609bd7da6963d02b08442a5abf71acfc942bf05cf1dd2efb83d472f7b5a15b5e80ea860c119983b4998dec1c80cf57033472beac32211fbe726e271f4cf61660fa80d3c66dec5b47f792045fb6183656cd3e6adfa0c0b46b10f453c8121bb94f2b50e9a94ed76c035e0355c4ba8a0b1d4fbb9d4267dc307ebe1c0efaffc4984a4629de386210e83317f01a3b5db38eb08eb52e7c57f30370905b39e2b7fb8ebea81b00fd6f8fbe21ddf0ece3a85a25f0a62ff6053a38084dcba35ed23eaba2a58663f027f63181998e876c69cde89d468475d6604b72d09676ec3b2a6701fc6923166789c6a22cd3bf25a1d8857ea6b10d2747ec6a94977553f8a9e36ecb2386a75dc73ca2c4f002ebeb46beaaab9840267e6a4af63f2f17b69d949608fa1fdfcfb6f52bf1a7a77362c6341103bd881fad6f0876a97e11a5bb9ba9edc6cc9fedf99f9b43afe5a92d8400ef1dbc5e3595b5d8eef6c959ab059c82eebc181deb7d3dbdbc5a919232c147720185b1ffc09025878b46cce55b979b9e53949fdaaabb496fdad4d8c6a64b7bd1dda1b2560707de3468fc3c555e4ad1bd7a7abb8b7a71ba83848e552c4aa86efd5b2dab43af5f5dda1912a0c9d06fea529f9112a4a7cec68a45896d332de39f0d371cf4c7169d4cfebd6aecea3b08cd114b6b59ba30276c865e7c18c89c1fd82c73f70e7a072a75a2f64704c46d5e0e46d7b3048f616c68b4d79716543ee65fd097624f23fe4b8fa13db0dd555a0c455fcf742fa5f0fd31dfc25318b9786ac6ee16d7074c8770b48c31977e1b1082102987e8690854aee41c0a8f1d09c181358dcb2ba001adb7efca49b2f72e1b2c9ba45eb96b9c37a6318db3486a9984b359b6ddae2db51a7f992e0aae37b08db695ba79c7371d5e417aab93acd04099f52587aae453e6dddf2df81c1d05e87528b9a2e12aa7d8b70198a20ac6e8879d45ecd61d2082f1e237b02563255f09875b9cc2c56d496482cab0477357ea0cdd3e6340175a2b1dc1f78a53ccad659db1dc0f9e0826d18d116cb71b271f8bd51d4308d75ca92ee87acedc9af2a67f1c393c7b020f3be28d38bf35869065d6c2e64b5efb3a800d3a70179c5eca11df1e91fa99beb2d60df1d984bf7fd93", 0x1000}, {&(0x7f0000001c40)="ed883a1c98d5cbcec756318400dc5f94fff4702087dd8f3b5aa971c060849aafedfa7b1f21d570fb961c62c086513a48f2589ef7129e6c3884505b6f6fc77f7310717d252f964f3ec5e249bc8a97789b13b40ee5ce6983d94da369e5a0c55df23e08cc9db7d74bf2d0bb083223d1ae1f64590cf7571a0f3d4d77ec94bbc02bf15f929a8c09d88ed7e6cea7798d420939d29d8db82254e7e6f1fe56c7004b781daceddae48875d09f4a8523b8e404d45a478ccc6d4a724c5d90b575538a5741be93dbded3fca7ce894efa110176374da2ffef073521824996a2552512947c2c9c4a839c63fba7f91ec96995e99312fa", 0xef}, {&(0x7f0000000880)="dfe9c4d24b5094691d", 0x9}, {&(0x7f0000001d40)="4fd022107c0cba7ad248f16737ceac61e2d67bbf9cf1d23479ce4590bb18458c65219281bcb0906f7e02e3b5d8d531accb6f8fd268f65069cc87c2226adb32eb9428adef62141b04de51f07f64377d451d1f37656d75682af55e12e3de6eee162fff4882957c554331fae49566825d8277661340", 0x74}], 0x6, &(0x7f0000001e40)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x9}}, @hoplimit={{0x14, 0x29, 0x34, 0x7}}, @flowinfo={{0x14}}, @hopopts_2292={{0xd8, 0x29, 0x36, {0x2, 0x17, '\x00', [@generic={0x3f, 0x86, "22c39b083afeaadbff37da546f6e0b679bfea58ee084df01aa7c53548607947657f94bb5b7f53e5e85e80e73ac9f067ab389e02a4f70363723e8de934a2d09f17e79333fa2d81bbd70ffb12200cd50da3d51a06d11a4ac58678515a25617b0f23791ef26c9cde1cb6834e0cd59610b548b76ae6ac83aa6e8f5dc4f6d911cf0fe7ad34be81463"}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @local}, @hao={0xc9, 0x10, @loopback}, @pad1, @jumbo={0xc2, 0x4, 0x8000}]}}}, @dstopts_2292={{0xb0, 0x29, 0x4, {0x32, 0x12, '\x00', [@generic={0x7, 0x43, "0af53b1ede329ddb2f257e8511f62311cd00870e0bf924d5b4d249db8f74fb21769de87df876a2340ba77282064b34f9bdb54367de4a4daa2ef4b8a21d5ae57f8ca356"}, @calipso={0x7, 0x38, {0x1, 0xc, 0x9, 0x97b5, [0x0, 0x10000, 0x5, 0x8000000000000, 0xff, 0x80000000]}}, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @dstopts_2292={{0xd8, 0x29, 0x4, {0x33, 0x17, '\x00', [@padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @pad1, @pad1, @generic={0x7, 0x53, "a44c4ea3ec1b70bf28612f340773cdb9975e95c2c72da13b04f1f74eda3e26e4ba13c90c50190d4952a800793984c08d86732f2438926c686caca3e0a2c18f30fb386808303aabec86c5cf3c8e275a26cf56c7"}, @generic={0x1, 0x30, "3f369ae24870f0eca6485c9ae2256491e1140bb2a60e3e56e9ce565e7be121d463acd39b7d84a69d5668d70d738b25b2"}, @pad1, @calipso={0x7, 0x18, {0x0, 0x4, 0x5, 0x3ff, [0xd42e, 0x1]}}, @pad1, @padn={0x1, 0x2, [0x0, 0x0]}, @pad1]}}}, @hopopts={{0x30, 0x29, 0x36, {0x12, 0x2, '\x00', [@calipso={0x7, 0x10, {0x3, 0x2, 0x40, 0x2, [0xffffffff]}}]}}}], 0x2d8}}, {{0x0, 0x0, &(0x7f0000002200)=[{&(0x7f0000002140)="04ee9786e94f81e5d04c3b6f803aa04f36d06d62d917bcaea83212d01444c9", 0x1f}, {&(0x7f0000002180)="a2781a709efaa91e0219bd8899ccc6023e6e83d3fe9ec793ac38cd2dec704b559efb3a30027849b5cbad8377bec4c81f982c9458fe6adcd664148a18b72452dfdacda8f3cbf42172d5b3", 0x4a}], 0x2, &(0x7f0000002240)=[@hoplimit={{0x14, 0x29, 0x34, 0x401}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x33, 0x0, '\x00', [@jumbo={0xc2, 0x4, 0x6}]}}}, @rthdrdstopts={{0x38, 0x29, 0x37, {0x6, 0x3, '\x00', [@calipso={0x7, 0x18, {0x2, 0x4, 0x0, 0x9, [0x9, 0xfffffffffffff4d9]}}]}}}, @dstopts_2292={{0x30, 0x29, 0x4, {0x5e, 0x2, '\x00', [@hao={0xc9, 0x10, @local}, @enc_lim={0x4, 0x1, 0x7}]}}}, @hopopts={{0x28, 0x29, 0x36, {0x87, 0x1, '\x00', [@padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1]}}}, @dstopts_2292={{0x30, 0x29, 0x4, {0x32, 0x2, '\x00', [@hao={0xc9, 0x10, @private0}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x3}}, @hopopts_2292={{0x1048, 0x29, 0x36, {0x3c, 0x205, '\x00', [@enc_lim={0x4, 0x1, 0x40}, @ra={0x5, 0x2, 0x7}, @calipso={0x7, 0x18, {0x0, 0x4, 0x74, 0x6, [0xfbf, 0x8]}}, @jumbo={0xc2, 0x4, 0x20}, @pad1, @generic={0x2, 0x1000, "5acb6eb20d69b798c5d905790a4b99c2f9dc2bd08558aca83bf7f5d06dd313bb548f9d8ebc13dd5fd4be33a3cf1233c1bf5bd7a0ea1100ef73a991fe1b0be44bd6674585e89b3049140bc1497bcd9806874ed8c6ff0ed3ec97cbb2c8d62647a6c53f4bc7e66280cc2f1f9789927c6e70f5f61ecf2da7584b7a40b4507ef35ebf3645a7d4a45fb3486c00f35befc9ca652b7ab7f39548c5a6e34eca17f799056a18a1df1da7d06fd4dd69fc3ade5aae67dfe56080398d611925cb74f8558f399b20cb94d1cc7a6e0e45d108b2fef705a1f418c6ef117edb8a60929ec0b58df95695b66c5466a06f61bb89b85827db26efb640c3dd5668c3124b8c34573b90a707bfbd48e4f23a32b5a8611dbc0fa888c11ba00f8291e31fe0f21d52b6444eafeefcbede6a1df6b45914ec66337f1e3c46472d7700d0393f64d3a725f4da9a97e4edac77dcb7073104de0b307a4e9cf0b49711d7c6bf88eb661a816e9a61377b40389a1fed0bc9ff7d373943cc387420f1c4c758084f7f2f47ce6d8e1b5c901b3604a12febfd1a18a4a1183cef80816ca77401f22b4b62237c68052d88b4ee34a73c908f420c4d6d1885be1b720ac28d27dded55f834f33987fdd59e25030301029993a348b023d86dc7037bafbfb630bc7ac8cdb78023f02028639bedc351597408cea0c5630f62b01bf3c9aa40ac7675fd20f1d5578edaf8bb33d8e20b5652041ffcce64b7aabe52f81d879ec280ea9ac8526984c4d040ce237817a4d1c4f6582a70cf67f88a629d73002cd27044fa9704f2a99cb8aa4d913dd096bdb3d17e14321810559e30939e8922a9b133977513b92b679369dc2f4a2ca25689ac79ae4a8006c4e42f7621b04020fb78e5faf9751c636aa445b7713b752d0ab1a04b2f75806256151c2ddf030501115e2d9051da91db421afcfd098b4e321757fa65cc420fba87dbc77cac3788294fa9554cf4bcf615568f50e03904e33786f2985169526628b53b5ab5bf69a6955e30a27273f6f9b763d0ef086f53ad7c54faa31e766701229c7217346c5c211cbf8bb68eb784eebfc2360e29b546fee60bc04346178f17dd3d99a5c763b761b76eb73cb9bd32ea7f7c08f118c4e41d6c15dd2efc1b0a665c2336ff33df869f2b2b169cd766eb71f160e1e6d415c22f11c0e160699b904e7146103c270c081bf529be98d9c13555f6f566bd6242df2bbd79e542da9e35d101105ace9c92d8ab4a5f6632343ac9eb908855c74f5714ce92d640c794e9f633fbcd889af9108627db6089cfdd9177a3f762274e5c92b2aa2bf5ebf8c4753f8709b8fa212e02e7967eac65f4ea1a6454e6814764b2e3c7b9f6c3b0e0d18d2d5616026158505d703e2704be66b9422d1abf3105ba8afc8ed735b0bbc0bda8789828a361ea08ad116ce96bd47b0fc6eb69f44de8d53ab0d4614ea47379eb36f3157e01ce837b413a041a581683d16df47c6cd5718ddf4e618cffdc72ba3dbc56c68dc72d2cca868be8991bd5945fb896d23414a459ef5307e93b18ee67f64b6eb911b7c3f0488431b6f9bb008ed7df98b03f469d9f161fc73cf4d73414ebdde031235aad117cb53afdb25c3c652c7566873b85d52a0f6ab550c3ef302b288d6439bbf881df2aedca14fa644784c22cede8dd978633e88b4d57be98135b4ef1c48fb34c0157e2fa1bd454dc29826ed82e6bee9d22d651782f8aed0859dea2359a6a19cbb0be856223e7b46fa9aada46aa91c1ba4719ca8bd29e48d9a50a962fc38f71d44e33998e0290e893dd4b12983954db42a05ff494fb438341653a4752d5a5f1cf1465817138feb0f7fabf6ea72d086b0d51aebd8025728a0cf068ec23d31d32a730274d48f4f6eb2f7fe42e34b50e295db7369c1d33083c93bff40ac6bab86fa62bd8c54b7423a8c6cf7d1e7a3a2d7c48c5eca58e8217c2bafe46a566f676edd9eb6403ce807fabab14eed11dc75fae2c4bc6d661d2a712908a388137dcc3ab71840809950ae17bda8b079113fe569a9cde55f5ec1ddbd4dcc5b120527a5e2eedd4ad3ff1a643807c31ec1c8346ba841a0a6499c225d94e391f0421a3a92f7b486bbf692a2479e9543a8e186b202bf36e9300159930b6bef4363e94d07aa55f4955402950b3adfed2a8829c0ed2bbf29823aac54c392d86d48ba2c0521f430dd564ce61db2a7af0e8354f54aba7bb273833c648482a2ec260d8cc4d9cfe430acd65a20c2ebe4d774973aaab1a3e924f3762ba24db2029a7a6f03c8ca6cdddb28b48bfe3ad891d73100ecebaf530ae06587b65889aadc3c81c40bbb31290b82e4acb402ee0929c6fd83dcfb399e3634b5f66cab2645b7f5b1d6552aa28e45427dc59164c62496bc3e825e9f0170a10d750ca735b117f45fa6a418153ffcd0f0d5d8d26d926a31697d56b9c91b902baa4cb8debcc072d9a1bb4901ccafdb56a14322c8719d4bfd8358a9f4c7a882ae4b550737a291f7ae868197f621b7da5dc23744ebdeddfad2b1b0679f86b82b8573de57d3ecb77a77146112ef673609e8608f3ef05a4e1208d0aaf57f97beebd0de02facb6469065188249c6d885ef16c087d7f6b9296c30df9d6b0bb312f72ec0fd51e62f2edfcc07261c5309d96ea9af679d6afb49266c08bd85f203d4c6fba82052ea3c53def00d5ed84b5621909b217e1abdfdd7c1985ebbc3dbaf63e01afcc680f988c053531ca960402af387b7150a7c86b413a75b46afdb01948660360db2de12f6337f6a85fe82dd2fb0abd079b6032890bfd035280ccae760fc8d2d4a58d24a33b45c3e65d0961b1002882ff094903090b94d86d8462fa2613a915d649760f802e8eb7bd269bfc32083564cd6563a597d103400f6c2f421117619d3407901c943aa0abb8208e0b7994ae5e0e7451193bd2f72bb27ee77fe4a7aba1b23a0135889c7caba6fc729b4789d241e39564bee16e06b094e6cbcd8de43a61a092e1ad70b525923efd3d4aaa0838c9c8d0a53921080e18ccad9ce9fef17ab2a9b488a4730478254f2dc4828b355f309087e85214b187e58e1f59428a002c84cc259b2e1064502f05abf938f294b622325c92b2305b67fa0ca651c0beb44321a064c6c36aa8f33d103eda0178e3a533ee998fa9ef5a3bd9ddd960d519825e05ad6d23269b12a6d93fd444c859a728c465c942313781347f9ad3e0e66cfaae5eb7b50fb5be2f514cde2f6ab814d891ee68440f176446432573fbb8ea8b3388d66242620aeb48e8f79fb60037675114429e09d0628a36a4d215257737c49524da085b3d2fc60c45d0dd6db7e94c8482f253055cc9a725d87a2effa66762e01c809d38ac9c618355b537268ec1ff35be9823e7d7cd7c5eb00853ef54ccd15223ce4d97387915e872753d3dc07c51350b631328f3790eb11680f5fa23442a3a21301e9372b3b68db7d96db2abc6cae8f1888d39a506b0a7376e18dc6cb47a22079222177b05b51e48387c7e7b925e45aeee282a3b76880d1fb3c8e88e0a3ec5436fc5e3b8236f2d494cbfcb6e1647228c101d8f1902f4073c2cb4ec020fbe87a8d880cdd8dacd4cb6663a20e7e395a5761faf6f7d7af6f8a515b7cbdf73f08adc02c986352e7aac4ceb756c198be585f08071d274fb16d85c3b785c5476472033e8e81b3e739ddffa8b3f1e872837fd1813e3416e363b6ad4b3653067de0ce5aa593bc904dce835ed8590baebd86f9844d9e5f0de346d64c365115678afd960d2f29fb3f47c081cfa6828d1fade618fa022429eb0644c1d1424e414ada523fcd6bd9d245e8c057b5cbd8d68956acdfc8c04d573526411cd3e5cc0397039bb054aa21b6ed725cbd649665b462706bca2ebc072c740ac1dc33714d619686a83d90848a2a0ceae7af0226ee19d7b193f9e05d3e7be35dcd4e702d75c190de82663a75845b8ad3967542631d8be25049474a9eb25238009363546c31c9be196a7e8c726747632e813ea25b54491cd5857a5ceba9c59302488a6861ab4e641230e339b9dfd94f9001dbdb18c1fbd24ae2d6ff499b23a5c7604d24f855f1004e422d65bdfd8e2f71c659cb7a2d2cff88ca6aed402ad4ad079132b5b517149a5771be87ea72c580bb98d565c632b219ddff0eda3710c70268eb2acff0f8d9009bf639659b88d7fce866091fde192ac0dea39b6ff39c2e9ee05a1edf58bad23dff84aea7d193d821fb3e7777265834f0b7f6f79ad6e89f33c53747bde9d45a012f858d0713967ab406684903874429695b99f9f3c2b71a629cd6f9181285904d1954360de14776a61fc5a9cc0708a07dfd8d117ec2481fabf6de0aec24f1e35629f269c16dbf2a03945177e6db341982e4fdc56d6ff40bffcbae533adfe9dd29c0c1dab05949e547caf41c1f335d6230c88559a53a92d1697fd1749ea667811bce335c64885678b1519b2cb3889a646f3aa89a8f60b3f465dee051aa26f7eb243f90782a19d98e2695b255016d0bd9ad58b0d1c78e08991531291d981d4bf7f97d50024d69b8c3af3c45ead382e2e04c841bc8bba3d09ebb609e1354553120a8a0adfd4002b02d7b6d63b8f738646890c3f809fc4631a1bb68d18aaec83bbfbfed4d0426c3d228e7f44607ee4077f308e84780902c3c8280f8c8398c52c88f04bb9b6765cc94fd0223f48cc4f0e90ee7faf91df65a397c9ce83b988e990ba0a319ade1bca079369207b342a051d95354c1f42126c8993434c47084e9343ccaa02b218e4af79900f5e67bb07928f9c18fbdb9a138efd42d421518644995f4ee41b22ebfce2a951da400f514d8bb324ad264157efb17db8f7844b5ef99e552597ddab8340cf7a71622e71d83acff7014c0aab9ed63d4de6c906e1f1ab6acbb70ecdd3ce98aa668582a160d043659181e42db544f4ce88c5e8b0f896ae32973e32f8fb28085b832001082b9698e828230a8730a9a3e6bd65e340ca0196e0f4dfec002827ff36e0cb25c543d3750e07a559cbefc283b368bd491d21e15f8e619788ffe21ad1c1904386ae602e718a57c896ea7570a5b01fa33dd5d41d3e47ec3260d6ba9a1ee8a335b78da5fb2bfe6cefb579a1047b7a540acfbca4f712c75acdb83d94ffc34bc424d3b9d0d730b2d5da5263a2515500112fc9dcce094c2feb947dae3f3c6837f657a4c08bfe56c523572ebcec3ad8117494113820be138c99f8873c5ced6ebba41de23cabb9bcbcdfed43d7ba025a30002a6e2d03a586396dd9ad582846a46acba2636858b3e4e140eeb387137e1241d78d2d7fc8babab9edb34ec7538b8d8a2603db0263c3df27e8de31dd72941e038ac97dff1d36490866da76f39eb35b417fafdf3e762a1867ae8fa5670d34a0efc0821e48671d6549cd774d3ecc04a92f4fa3a11d6bcf298dbc765fcabc7dc51ecb7bf9908fa573d49c524291ba4980d0b2e76a14116380c49e754ea0575a5e8202beec349640d7bfba58de9a59f370b89ce27a042d13db1a369b4c3ca5adf28713ec34603d799c6d4bd6161c2a18ae2e5ff141f9258a484ab0da042d400ea21bdfc016287a04e7e77f2d98b98af804efa4edb49c7c5ab33121df34a68e6f49f85ef75a2944fa5cf07989e005e09ea1d3d01f88d5d81b4815c576c588e24bc5a1adafd3c4fead5d342024f9d6730050cb93a1cd3cd106367dde8ad9902f333d0b331d9816516d52244d70abed50c3638884fcf7ffc748064009b2e5129264e0993848b6c1301184e42ead4d893595ef177543338f18aa82f6dba1950273c0d321e52854a9a40a01b0bbef7f4ae2c4c9483ecc842527289dac07a6e9834b6e303e469"}]}}}, @tclass={{0x14}}], 0x1170}}, {{&(0x7f00000033c0)={0xa, 0x4e21, 0xa1, @local}, 0x1c, &(0x7f0000003480)=[{&(0x7f0000003400)="5ff9bf58ca24cb1bf9b3e47876f82ca9a9aa49ebef3f425e2b08b8ccfd8cdd18dc7261663d2348d11a0ceb75ef75541874dbc23a60344c724a749be066268ea749a59839f121dfeda0cd99641bb1e2d22a12b0075bd32dacbed8257459ec", 0x5e}], 0x1}}, {{0x0, 0x0, &(0x7f0000003600)=[{&(0x7f00000034c0)="b33aa432504c55a73cbf952605fb35562709b5ed1d6114b21d56fb4e9fdeaf492d06655c7367d8dfee119255a33d01e1a2211914865efbb0373b2f319fba54d816419b70", 0x44}, {&(0x7f0000003540)="6cfbc4babb10f751502d5d2e22460f757d7c69492c2fc39c35460ba2a78f89e015af935c02ac86d8331ea8efdbce1ef00d85411bcbb915b702104767e9a783696bfafde15d4ae4e2e1fe30549f182ab794651d15b60eb4d7d651c56a232f0c3060ce69d16f36b6b1f0a5ec3018a47ac1c963b0ec43b1a5a0293804678747ad50da08ba53b91d889972860b9dbc2081915d10a043", 0x94}], 0x2, &(0x7f0000003640)=[@hopopts={{0x1028, 0x29, 0x36, {0x1d, 0x201, '\x00', [@ra={0x5, 0x2, 0x200}, @jumbo={0xc2, 0x4, 0x81}, @generic={0x8, 0x1000, "a5192de949ce2f908f0e817ab0563feb4459311c1276efc0dbe6065136776438c1f8aea649b4cd19e34085cde262ad6b314416648ae25b4afaafc4595b7864dd8635e9f2e2d1e93bc01a728f4818ee3833bd8e216ed5356eaef3ffd493ee87d6c1f60afacd25932fadcc8977158137b6851df9402703122fb93ba983bcb0c8e16ddd68c35bfb78f5b3adb1db542995d4109ac82e961c03ab76b913cdd273ff7f884e704cfd3124e8052c327289a80cb9504da8995d07430cdfbb4b6b19637f21ee1c0a7756ccfc63e325c7d0c6564c4f782e95232f7ae9b372ffbcfe9054be721ed5fb780ce1ccceb3f429a6eaa652e22986dd3ff5beabac1d2542beed41824f54ae07e541fbb6b0834795e39f72b93699506319d888108ebb98c64e773c3357c8b6ba975935bfc1dae7d27c40abcc7dad9cbae8067e00406457dc663308f154b5d7dd4f56abc149ebc84928750c5a360799e5f14db6ff95f9993fe7e9354827d7f82b80652110d9a0fe3f547cd0ae1cfcc6f23f50f42f481ccb2e9e2932d7330525fba88a540a788b2ca28262abc15b36101b6aa5fe1c9109390bac8b8b64c505b0541d06ac5d9e1c2690a83ace37b93a9946c29c2a8e520b4b3ca7ef051156e5801144cea413e5b46f442b81c9f6db249ba2e2aa7575eb3eb244b7dd4b97671b32444d263fc2519d1a8325698b52a0cf68bade5a0a11216dcb1fe03b4fc36899383bb515478416cf4c32721fbcaa54bf8a65b8d5e6e7e7c928c157ac0222a5794af50342118d78160346172880f78611e53e540ae0405c7dfb6963da514c10596bdc8b9d6259da9c546baf5124fda69c424fb33aeb3655fa56f0c2b501fdff5035832ebf7d468ea37a14f03d28208c8109153df654e1ebc0a64f76cce1096f14ab6d3cf31e0e1388a2981001d79e09771b89868ae69f05284f86fefac68948902003fe3c8e39ddab7cc954c579c4988294d1c2f23b1a0c921bfb2496c1a4f8b0449313e72f5a3b1f95c2512827bc9773dec03948e1d3cc215df201dc49ab64b98d5ffedd226b2899ef8d98e07320a702e360da6929eb390ab0e85598680adbee3fb5b80f7ef3164e9f3da888470814b641d198bd595464d11bb84cd69fde9970c901bc85d24acb0d90f988adf9529bd40f6e247e2bc40078d201d66be7f2155c0c5e4b35d7aef450a6a1530a2c34769637abd249490e7600df1359f0d4745255a32791aff19cba9c8f3a90346e38964fb34f5bb7d00c02276ac98c2c7080e8423ba06f72b616bcd292239021995eb60ccf9374bbf45f726a6508cc19f22b53e1556ae0324c2f8acd7177fb0b54fd91e2751151b43b243376eb64b3890da19c90ad1436e40314bb0ad17077f445dda0bfa384e407177877064d34ec84ff5ac1bc6f874b8d535a5ef9c3df54ac9ea4e275d5f704fdfab47562a49c19244538255756006687c7c8075f9b582223cf224474340151e39ed1fe628a462dae999dee94c786a03cd03f08d316463916cd7a023513abac31fabe887d5147d7d444606dcd195d9464417c611afcf76a62be87c27e17eab85647f81bc07087dca2cd94cdaed1edc019ce5fdec3335232159b2833dcba5cfd7896d865e35ee6e6925714b1e145b7916d444822056d82f10c23f791ce818fab4fb31294b73bf6fde16ea9b822e95a31d614cffcc6d6145af01799c8953009a5cb68a129e1be342dfc08544dc765a4d0cffbc9c8ae8adca1dbaa9922a5a5ea0b8bc6eed46259483c59fdb4f24c2cdf7802152a001a9f5e35c32309d2dd46f512312d5882ad7fc1d91a36e7350278d3339236d760f22bf96193e9ddbab92819f3a1a2d35a235bbfefe3c8c8d2890747e9813dd9f09325dc6f556b3011cc5500cf820f9d6065c6172383c131348f941189ce9c2257780bea284bf4eb63512ef3c7be4f7a8712025290d36d99760133cffa37495d46bbfd190f23abe14b0f806aaa1a6d3331f97b7f28d2f33499fcde77e1cfc262e5f5dce693e0e4f3e9c14f6a36bd3245c1f40743edd8ff39539e2dccc482fda8633b598f002915e43ff0cdbba47be58bd0dbd92f052f6569ee6cbdc2b89668233eb91c4e699b359ea40116c05ba1dbfdf032771608125c93dc5e46145dc1a283c16685ea69d5b8b3c0c1e0a19a6d62879565226b7728ef76ea274826285e61b825f4257acc2e18c7c9aa13ca886eb66a4d4c56df826f35856d68ce5ffef6b65dde2c93d3b334c16988750eec4f01f9b4e03ec712606fb02ded8054a08e22dc6e9623441ac4c228a3a60987980f83831185fc15250f6d831942b952947a8e8657da226b247660f5b20daa0385b3980848c0d0022bc7a9c19975129621a67b5975064740b595f54cf669aca88ba8db8d4be0373db4bad84152c0021ee4ce773a945fbdec71a6ac5fc1b76b89e5220b7a1968d3c23532cdbee39211dd8ed573dac34e032d0c45a0579846a9c8ba3a4e6fce069ca003e0c0b0e67fe9b9a82ea0eafd035eb468232c09ee615dedf16411d4363bfd5d82cbd87e70d5a91c1177af3d5e4e6b7a7d5c8ec2b80c1b30edf290008b9ae4285277d582658e2e4ee49983387f18d828f7bb2d08572b1252d9eac4e58bbf3874d02cb0e8b4b5b55587ef652bface7f9cfdd68378820a337666d2bc7b5e1b15e51e35faa95da51eddba2b455ae303b1f576b8f84a3ed36bd346361d62e17a35e15a083e28c83c15f2ed06f072f9dbe5ad718133dad266cb1365a3b618b9dbcc5f633857268085fdbe325a45fee5c4eb2166ffafc3a4a4eff6e5a21ef2c2a6620f7c451345d5c3eb3a831c6c69c1d565edd259ddaf09f3137b88a843a60cbcca8355de38d4f1952520a989fcb154c4e28334e3c5b399a7cf54ef6560e6abf20aa2a24122655d8c8e2ab27461b93771948c5dabe1bcbe61a365c18c5c3a0d3a279b7facc1f8b024cadde8845bb33e45b63292eeac732667a4efaa86758129b190ef310a17c0e4b57227b09b8c48a6f24422dea5e464a9769556f0f551ecc160f1eb1426c5fa62aa525a9ec43474a1534190b24d4dc17207b9e96529e2b0a82f599077e5ed7eb8a7a2cad13dec7a410d0e09958ecaa7b03e4a0142ee00a55237a3f70de03160c753ba6ba2887f25afdd20e7232560facc8a0d96cdb5dd5784e1d91030d383c9065ef68471742875cce5118785dc3bc65380c670ee1c25b42a92d791b47b1b77251c8934220301b9ac54fc7f194a2b2f3d9d3eb0c9851748918c01973e0c2418749cc6b42267a0f44569de7c484fa1e31dc816744dbeee7b210b34cabe2b6ac54fd03e313a34672089116734e01f04593e5aed841737f329badbe5b913539e93f310204d1d4b7073858866f9125d14052242a3648bc16fc383a34fc6eeb624553a5293a7cda032af3a2ddb6f47a3e87e077ddb404d2fc5c00f857c930787cfb350a0569e83e96261c88158514ba5ee45a9cbf97bb5962277397982de3545777f5c6594d2f0a71afb74d2d3a1ce9158b36afbca213e5f03de41c5c23f1c1dcebda0eb67c7c11310c15a35d650c9291ec19c71313cba8ed70af002c76c90c40503026873b377de8e1e90103f4912e755eeddf030eed7d91cba9479b360b77071acb53b5b700a0e84fc0c7cad6796edcfc8bc6492ab564159629ba8795ac25c9477a608039a91b928b05187f806249cda74b8624cc7d97dda74dc5394bd1319f4f5ef637b960e14e848ed9c5e199cd907383bc36410b37e311b658f2a093a34c37292b16c55d8ed7ba7351730ac72d073e3b6ddb754342ada40ea62c85a1c089b99a2d15ac4c5a8e30305c5b70e81b4fbf61af58f0124f86b8c135970895b6365d3fb1cf2aa1741dec8697e9b60841aaa21f5f1bc84c74293db5b66bde8c7938cbb5ebd5568e572d4a4328255758c6adf41c55ad4cdf1a4c3b8f0b4c64e36b7a7d6683e3b0379a7081817fe0c5cfb5b6bb6424d6ab5a17784e15634084d2943481c41985bd37757fecc97b460d686186b3d36c2d12925e76508dde58dde3b19b6d526b3e803207fb72648ad2fff37fd22e7f76c78f1b6b66e52422819ad813f13ff9042976ecbda3686c8d9d3ae083e4832932d13451c255c79d4ef339d25c1f17bd50177877753737785430c7258dc18e03aa925b913c7699cb369e1efd7dd95c2b3f50ef2889b4a64515297a87a2162d9f4905672fbb9d19ddfea7fcb612047ee073b42ad4c946bf0147a5283e6706887159e807e6b8705616cb9448a17a970e47488998a24faf1ce0836d6058bb012943839fea298aa32e329ae165dfc5b1d2fe11cf857b654058c39490611f324fc51a162baf0999c1f429199dc42a273dac71cd61f5a5cbc72f9b42ad5d6de82f7b3180bb99a327a363f915af37df455d60b299d89933c35a9c03db335570859db534658f0a291f789a7290f19c0c33d0125506b20efd044d5ff6281722b95d72df1efc1306e48e895cb007b398a1e79ebfd6def9d1e53a02269f68256ca8af48aaee067adcdc8d1b60e20fe9ececfed53bee83e43b7733b77ba23ac6f058bb2514e25ffbde770621027b7e60faac16e17513d6f276486e402bf3a3e031ca5685982b16c4cf52b7eb0d1803e848db8a9e2fb3881f3596be62f3a799d65b75a8a8c27c12bdccdb4ff3adc31d091f20e2649b56693fdc44a7bae38a9e1bc9811f8523825711d1d5022e018e5aad2627458f8f76e930cd232776589c02dfa615c4c94d0b9d85be79cf097ce5f71129d6a6b3d55706d749f0d061e68c2e6cf7fe7d3969c65fe6a7b3700ee997503016c0eaf2f4392825b6a4a990fa1a6356b141b2ef44372ba20c26755252c336ace9b6fddf36f8a4b94a7c647b42c7f6152bfa389b721bf3f18c306b9a9ff4e846192e341cab061c86bcd4d7ff8febc4ffdd6cbf1d44b2b6130f96ee18eb9e33d59f1459fb1e290bc6e88c1a6e9d8008b9418e909a0ab7f51b4438ae35ed6ae6edb29dd96e42e8428f4c3499ef635148db1dd69d08a1da45e3b0720d583e2a35a8c3d94f04d401ccf1e6569ff638c2ec8790b1470003d45bc05f97d1c198d2229ad1eb859e65a74671e6ab1bb13f592382db8d2dde00d96ee12785937d9d24205b7120acd310859536280e18ebfa00536779d4d7cff768e6f100d4a40ea4816d843ccdb050378b85e5521cf3d8c28e27b15f5900b01d0a64c73f40669dca03b83770e87f5f6101a92147d7ed94ed9560940ad1e67900b7b44e6c722fc87458773de46147995e1be49d355f9af7ae7b384db69ebbe941108526afcc4d727210dd510c014cd1724b64c50013e43e1f03b5568efc87391a1a3c12bb7705672e9543916b392d4070d9a1d6f08e4ad4c55590438651e6745c49631f6bc95ffad1633b35b80cabc8e725be815ae439790a78f136017efe63e7240dab78ec779261b733d723a792cc23dad6c218cdd80db53cb2645528712dc97c6c05d4ae9628c943416c5e562b4d9188f8a477e5f8972526fa8bd119d96f4f334362017801b6af070962985c39631650a8b345a89f978942ad37055c42e3d28e9d67ba644b05572d3b5de8a4d88036f64b31fa66c6bf39ccd36e4d45b1bc6b0e97579b16e16a8ae4b68a7ab185cbc0179f0e3f3ce4165492c57f3c61aaa15fadf29c40a56e849f0eab5f0ea191b02269364bcb596d478cd5779ea2bef081089dfd70eb7566470145b0af1d8cdbce21bed3869f1ff2583f14aa7f8b93c49f5c64db3e076c28dad9bd9ba971ca7e818a78d01ff433c8dfd6966318a27729f08bad48ce18490d15173e4e904a6b7a1c8cf2faf"}]}}}], 0x1028}}], 0x6, 0x4000) syz_io_uring_setup(0x3c2e, &(0x7f00000048c0)={0x0, 0x1ed6, 0x8, 0x3, 0x1c4}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000004940), &(0x7f0000004980)) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:21:07 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000002, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:21:07 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x11e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:21:07 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fI,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:21:07 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_\nummy_encryption']) [ 1830.760871] 9pnet: Insufficient options for proto=fd [ 1830.763020] device lo left promiscuous mode [ 1830.774684] EXT4-fs (sda): Unrecognized mount option "test_ [ 1830.774684] ummy_encryption" or missing value [ 1830.797230] EXT4-fs (sda): Unrecognized mount option "test_ [ 1830.797230] ummy_encryption" or missing value 03:21:07 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:21:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x4056}) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x242001, 0x4) 03:21:07 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fQ,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:21:07 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:21:07 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_\"ummy_encryption']) 03:21:07 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1830.920219] 9pnet: Insufficient options for proto=fd [ 1830.924890] 9pnet: Insufficient options for proto=fd [ 1830.938633] 9pnet: Could not find request transport: fQ 03:21:08 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1831.001767] EXT4-fs (sda): Unrecognized mount option "test_"ummy_encryption" or missing value [ 1831.023215] EXT4-fs (sda): Unrecognized mount option "test_"ummy_encryption" or missing value 03:21:22 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:21:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:21:22 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:21:22 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:21:22 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r0, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000080)={@desc={0x1, 0x0, @desc1}}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:21:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_%ummy_encryption']) 03:21:22 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:21:22 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fR,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1845.550513] 9pnet: Insufficient options for proto=fd [ 1845.558360] 9pnet: Could not find request transport: fR [ 1845.578307] EXT4-fs (sda): Unrecognized mount option "test_%ummy_encryption" or missing value [ 1845.589289] EXT4-fs (sda): Unrecognized mount option "test_%ummy_encryption" or missing value 03:21:22 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:21:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:21:22 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESHEX]) 03:21:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_,ummy_encryption']) 03:21:22 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:21:22 executing program 7: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000180)={'ip6tnl0\x00', 0x0, 0x29, 0x3, 0x40, 0x2e0, 0x41, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, 0x10, 0x7800, 0x6, 0x2}}) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000004800)={{0x1, 0x1, 0x18, r1, {0x5}}, './file1\x00'}) ioctl$sock_SIOCDELRT(r2, 0x890c, &(0x7f0000004840)={0x0, @llc={0x1a, 0x303, 0x80, 0x40, 0x4, 0x1, @remote}, @llc={0x1a, 0x13, 0x3f, 0x9a, 0x1, 0x7, @remote}, @isdn={0x22, 0x1, 0x3, 0x9, 0x6}, 0xc35b, 0x0, 0x0, 0x0, 0x27, 0x0, 0x0, 0x7, 0x3}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r4, 0x1, 0x6, @dev}, 0x10) [ 1845.770856] 9pnet_virtio: no channels available for device 9p [ 1845.800193] EXT4-fs (sda): Unrecognized mount option "test_" or missing value [ 1845.814547] EXT4-fs (sda): Unrecognized mount option "test_" or missing value sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004680)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x7fffffff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4c7}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000240)="aa5a5e2fcf2b2e78ed889f517c5c07a27b13969bf668cfe18c2f184cf34cf9e41773a5e94cf4235347bf20a0cede8cd29329e096be751a100e12a823980fc72a885face2b7b6258713603ccc771924ebbf5a6a489b414a86f84509ad24d0b94f1fc7fb7c7676f7675b4048c8729b9198dcfb8e94d8b8e6271078cb7aee7501dae910c7a6f269d733012c0ad1a5f2a1ffd9f30b0a8329e79d76", 0x99}, {&(0x7f0000000300)="c707b9e557110f5f0d4ddb510ed65df08083163fb9d0b07f20e9f7124b489941380c41479b377245cadec1f03a4b47cd77af06f8a2221683253bd3fe267876f7ca3a760ef1a7e263463b8dc3fc2270b13a673bef6d49f78dff8f61c02a73a0271902536e34bee8474f3757748c4bbc2a4810f0d7c331b277230a37207e6ebf896d9cf3138c956439cf5c4ab28fcb8b54206ce286485cb283fe2395773ee177b13785928341d6c95029c0", 0xaa}], 0x2, &(0x7f00000003c0)=[@tclass={{0x14}}, @hopopts={{0x60, 0x29, 0x36, {0x0, 0x8, '\x00', [@jumbo={0xc2, 0x4, 0x3}, @jumbo={0xc2, 0x4, 0x4}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x2}, @hao={0xc9, 0x10, @private0}, @ra={0x5, 0x2, 0xf466}, @hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @enc_lim={0x4, 0x1, 0xbe}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x8}}, @dontfrag={{0x14, 0x29, 0x3e, 0x3}}, @pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, '\x00', 0x28}, r0}}}, @dstopts_2292={{0x158, 0x29, 0x4, {0x87, 0x27, '\x00', [@calipso={0x7, 0x10, {0x1, 0x2, 0x3, 0xfff7, [0xe]}}, @generic={0x1, 0xcd, "c79a83de8d2277942f45dcee76a0450a86f4589915801ebb4ad54a7e5a3c6b7a4e5af51bb1dee6864cd60f39b8564e7452b5d357a3ccc8244616c835a7b516cf39cd5a77a7bc1276cf32752b23ba5787cc129bd326bae79fe75058c41daf22f9d1301c5cd03974a45f81acda75f686c9d14b90d0f5358ec03fc7d87a12b061267b0d771ae65b2addd88e4fad0c6ffff1a5b324ee1fb06c0d87147d803b75f3cc8dec7e983de7d06a4acbd34b8c83d1e4c40863fe3b376bef93218a53384182834b0d271f8bda8a141873f827fa"}, @calipso={0x7, 0x58, {0x1, 0x14, 0x9, 0x40, [0x5, 0x5, 0x2, 0x1ff, 0x0, 0x7, 0x3fe000000000, 0xffffffff00000000, 0x2, 0x2]}}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x8}}], 0x240}}, {{&(0x7f0000000600)={0xa, 0x4e23, 0xffffffe0, @remote, 0x1a6}, 0x1c, &(0x7f0000000800)=[{&(0x7f0000000640)="973dc7610cc11fd535b12f4e18afc8c3c4ff85300f5fd3dac5571767513674bcc8c19f49120530f39f9fc3e170891f81d0920f0237d73ec4e410d9d96a0ac207e08d83b198af96a22a48347ff465c55f1c655a", 0x53}, {&(0x7f00000006c0)="8a7967459e0482935d93c07799de28016e068d8e83213677383765c5e8", 0x1d}, {&(0x7f0000000700)="0c8e88c6d804274f3e6359dd121b239e36b82b80d9f715d219ea03f2050e63e6820522686b7096154e80de5f1dbff5117dc047861c14022d2d8a4bee6087c4e5ed4a0f195ff54e4f54ef1074c502549b4e2507f87a72a3628d7295b315e1810b99e0ca6a7e9a43c7a4a971b725ce790bab9607c22482fe258cf4c1744e00dcb1b6da04d644def379b3c9e3fc2e34e8768cec82730efdfaace122d737c2dd6701dfa17a7ad8cc7bc5013de0646d1732c002b7c8d01ae52eebba524aea38347957e21f6940e4cd6765e2b99650b0", 0xcd}], 0x3, &(0x7f0000000940)=[@tclass={{0x14, 0x29, 0x43, 0x6}}, @hopopts_2292={{0x58, 0x29, 0x36, {0x62, 0x7, '\x00', [@jumbo={0xc2, 0x4, 0x101}, @pad1, @enc_lim={0x4, 0x1, 0x9}, @jumbo={0xc2, 0x4, 0x4}, @calipso={0x7, 0x28, {0x1, 0x8, 0x6, 0x7, [0x2, 0xff, 0x80000000, 0x7]}}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r4}}}, @dstopts={{0x68, 0x29, 0x37, {0x2c, 0x9, '\x00', [@padn={0x1, 0x2, [0x0, 0x0]}, @ra={0x5, 0x2, 0x3f74}, @generic={0x8, 0x2e, "487848378942c5e1a328c022db236f9e2ea9989641b6f79d9a01099884d67215e1da152fdbcbd795f7d8b4fb4244"}, @hao={0xc9, 0x10, @local}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x8001}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x8, 0x6, 0x0, 0x2b, 0x0, [@remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1]}}}, @tclass={{0x14, 0x29, 0x43, 0x10000}}, @dstopts_2292={{0xc8, 0x29, 0x4, {0x3c, 0x15, '\x00', [@generic={0x4, 0xa1, "05e5b5736e16e8925036a948755e97074f5dc2448502a5c961ea642ec587b432348a774f573a9e6888df54beae7cd9fdd58bd64f3a210ec6f1329f404b4663501fb2fa5ab5e3c820832803cdcb6da3df79f57245e6b9d69f60c0985edacd296f33d573876eb0e703edbc8f1c1b6d9914594cbfea5edc4659c19b13e70ca2a515cf8b5f5cff632c16f45c446ef98401d864118deb338e50bbce4de45908cf05fe15"}, @jumbo={0xc2, 0x4, 0x5}]}}}, @dstopts_2292={{0x20, 0x29, 0x4, {0x88, 0x0, '\x00', [@ra={0x5, 0x2, 0x3f}]}}}], 0x260}}, {{0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000840)="f2aac38ace120138fd2992c1b30d11aa17f80f14ed3566a04fd76e1d7c4d6c5f987961664a84e4cf5d20c71615b9a2c48ad9f9f4702858e2", 0x38}, {&(0x7f0000000bc0)="d9272f48d2df1210c20016d89bbc3f0a81cba78803b61238db55068dc83b80379ff5ad11edab5818dbc278ecf09719e66f0858c7cf5b9ec3f247710a29c4ff201b1278c7492864b787c8d0c45e8a7e7841e6b5c7a67af0efb67fa1330de0", 0x5e}, {&(0x7f0000000c40)="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", 0x1000}, {&(0x7f0000001c40)="ed883a1c98d5cbcec756318400dc5f94fff4702087dd8f3b5aa971c060849aafedfa7b1f21d570fb961c62c086513a48f2589ef7129e6c3884505b6f6fc77f7310717d252f964f3ec5e249bc8a97789b13b40ee5ce6983d94da369e5a0c55df23e08cc9db7d74bf2d0bb083223d1ae1f64590cf7571a0f3d4d77ec94bbc02bf15f929a8c09d88ed7e6cea7798d420939d29d8db82254e7e6f1fe56c7004b781daceddae48875d09f4a8523b8e404d45a478ccc6d4a724c5d90b575538a5741be93dbded3fca7ce894efa110176374da2ffef073521824996a2552512947c2c9c4a839c63fba7f91ec96995e99312fa", 0xef}, {&(0x7f0000000880)="dfe9c4d24b5094691d", 0x9}, {&(0x7f0000001d40)="4fd022107c0cba7ad248f16737ceac61e2d67bbf9cf1d23479ce4590bb18458c65219281bcb0906f7e02e3b5d8d531accb6f8fd268f65069cc87c2226adb32eb9428adef62141b04de51f07f64377d451d1f37656d75682af55e12e3de6eee162fff4882957c554331fae49566825d8277661340", 0x74}], 0x6, &(0x7f0000001e40)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x9}}, @hoplimit={{0x14, 0x29, 0x34, 0x7}}, @flowinfo={{0x14}}, @hopopts_2292={{0xd8, 0x29, 0x36, {0x2, 0x17, '\x00', [@generic={0x3f, 0x86, "22c39b083afeaadbff37da546f6e0b679bfea58ee084df01aa7c53548607947657f94bb5b7f53e5e85e80e73ac9f067ab389e02a4f70363723e8de934a2d09f17e79333fa2d81bbd70ffb12200cd50da3d51a06d11a4ac58678515a25617b0f23791ef26c9cde1cb6834e0cd59610b548b76ae6ac83aa6e8f5dc4f6d911cf0fe7ad34be81463"}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @local}, @hao={0xc9, 0x10, @loopback}, @pad1, @jumbo={0xc2, 0x4, 0x8000}]}}}, @dstopts_2292={{0xb0, 0x29, 0x4, {0x32, 0x12, '\x00', [@generic={0x7, 0x43, "0af53b1ede329ddb2f257e8511f62311cd00870e0bf924d5b4d249db8f74fb21769de87df876a2340ba77282064b34f9bdb54367de4a4daa2ef4b8a21d5ae57f8ca356"}, @calipso={0x7, 0x38, {0x1, 0xc, 0x9, 0x97b5, [0x0, 0x10000, 0x5, 0x8000000000000, 0xff, 0x80000000]}}, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @dstopts_2292={{0xd8, 0x29, 0x4, {0x33, 0x17, '\x00', [@padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @pad1, @pad1, @generic={0x7, 0x53, "a44c4ea3ec1b70bf28612f340773cdb9975e95c2c72da13b04f1f74eda3e26e4ba13c90c50190d4952a800793984c08d86732f2438926c686caca3e0a2c18f30fb386808303aabec86c5cf3c8e275a26cf56c7"}, @generic={0x1, 0x30, "3f369ae24870f0eca6485c9ae2256491e1140bb2a60e3e56e9ce565e7be121d463acd39b7d84a69d5668d70d738b25b2"}, @pad1, @calipso={0x7, 0x18, {0x0, 0x4, 0x5, 0x3ff, [0xd42e, 0x1]}}, @pad1, @padn={0x1, 0x2, [0x0, 0x0]}, @pad1]}}}, @hopopts={{0x30, 0x29, 0x36, {0x12, 0x2, '\x00', [@calipso={0x7, 0x10, {0x3, 0x2, 0x40, 0x2, [0xffffffff]}}]}}}], 0x2d8}}, {{0x0, 0x0, &(0x7f0000002200)=[{&(0x7f0000002140)="04ee9786e94f81e5d04c3b6f803aa04f36d06d62d917bcaea83212d01444c9", 0x1f}, {&(0x7f0000002180)="a2781a709efaa91e0219bd8899ccc6023e6e83d3fe9ec793ac38cd2dec704b559efb3a30027849b5cbad8377bec4c81f982c9458fe6adcd664148a18b72452dfdacda8f3cbf42172d5b3", 0x4a}], 0x2, &(0x7f0000002240)=[@hoplimit={{0x14, 0x29, 0x34, 0x401}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x33, 0x0, '\x00', [@jumbo={0xc2, 0x4, 0x6}]}}}, @rthdrdstopts={{0x38, 0x29, 0x37, {0x6, 0x3, '\x00', [@calipso={0x7, 0x18, {0x2, 0x4, 0x0, 0x9, [0x9, 0xfffffffffffff4d9]}}]}}}, @dstopts_2292={{0x30, 0x29, 0x4, {0x5e, 0x2, '\x00', [@hao={0xc9, 0x10, @local}, @enc_lim={0x4, 0x1, 0x7}]}}}, @hopopts={{0x28, 0x29, 0x36, {0x87, 0x1, '\x00', [@padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1]}}}, @dstopts_2292={{0x30, 0x29, 0x4, {0x32, 0x2, '\x00', [@hao={0xc9, 0x10, @private0}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x3}}, @hopopts_2292={{0x1048, 0x29, 0x36, {0x3c, 0x205, '\x00', [@enc_lim={0x4, 0x1, 0x40}, @ra={0x5, 0x2, 0x7}, @calipso={0x7, 0x18, {0x0, 0x4, 0x74, 0x6, [0xfbf, 0x8]}}, @jumbo={0xc2, 0x4, 0x20}, @pad1, @generic={0x2, 0x1000, "5acb6eb20d69b798c5d905790a4b99c2f9dc2bd08558aca83bf7f5d06dd313bb548f9d8ebc13dd5fd4be33a3cf1233c1bf5bd7a0ea1100ef73a991fe1b0be44bd6674585e89b3049140bc1497bcd9806874ed8c6ff0ed3ec97cbb2c8d62647a6c53f4bc7e66280cc2f1f9789927c6e70f5f61ecf2da7584b7a40b4507ef35ebf3645a7d4a45fb3486c00f35befc9ca652b7ab7f39548c5a6e34eca17f799056a18a1df1da7d06fd4dd69fc3ade5aae67dfe56080398d611925cb74f8558f399b20cb94d1cc7a6e0e45d108b2fef705a1f418c6ef117edb8a60929ec0b58df95695b66c5466a06f61bb89b85827db26efb640c3dd5668c3124b8c34573b90a707bfbd48e4f23a32b5a8611dbc0fa888c11ba00f8291e31fe0f21d52b6444eafeefcbede6a1df6b45914ec66337f1e3c46472d7700d0393f64d3a725f4da9a97e4edac77dcb7073104de0b307a4e9cf0b49711d7c6bf88eb661a816e9a61377b40389a1fed0bc9ff7d373943cc387420f1c4c758084f7f2f47ce6d8e1b5c901b3604a12febfd1a18a4a1183cef80816ca77401f22b4b62237c68052d88b4ee34a73c908f420c4d6d1885be1b720ac28d27dded55f834f33987fdd59e25030301029993a348b023d86dc7037bafbfb630bc7ac8cdb78023f02028639bedc351597408cea0c5630f62b01bf3c9aa40ac7675fd20f1d5578edaf8bb33d8e20b5652041ffcce64b7aabe52f81d879ec280ea9ac8526984c4d040ce237817a4d1c4f6582a70cf67f88a629d73002cd27044fa9704f2a99cb8aa4d913dd096bdb3d17e14321810559e30939e8922a9b133977513b92b679369dc2f4a2ca25689ac79ae4a8006c4e42f7621b04020fb78e5faf9751c636aa445b7713b752d0ab1a04b2f75806256151c2ddf030501115e2d9051da91db421afcfd098b4e321757fa65cc420fba87dbc77cac3788294fa9554cf4bcf615568f50e03904e33786f2985169526628b53b5ab5bf69a6955e30a27273f6f9b763d0ef086f53ad7c54faa31e766701229c7217346c5c211cbf8bb68eb784eebfc2360e29b546fee60bc04346178f17dd3d99a5c763b761b76eb73cb9bd32ea7f7c08f118c4e41d6c15dd2efc1b0a665c2336ff33df869f2b2b169cd766eb71f160e1e6d415c22f11c0e160699b904e7146103c270c081bf529be98d9c13555f6f566bd6242df2bbd79e542da9e35d101105ace9c92d8ab4a5f6632343ac9eb908855c74f5714ce92d640c794e9f633fbcd889af9108627db6089cfdd9177a3f762274e5c92b2aa2bf5ebf8c4753f8709b8fa212e02e7967eac65f4ea1a6454e6814764b2e3c7b9f6c3b0e0d18d2d5616026158505d703e2704be66b9422d1abf3105ba8afc8ed735b0bbc0bda8789828a361ea08ad116ce96bd47b0fc6eb69f44de8d53ab0d4614ea47379eb36f3157e01ce837b413a041a581683d16df47c6cd5718ddf4e618cffdc72ba3dbc56c68dc72d2cca868be8991bd5945fb896d23414a459ef5307e93b18ee67f64b6eb911b7c3f0488431b6f9bb008ed7df98b03f469d9f161fc73cf4d73414ebdde031235aad117cb53afdb25c3c652c7566873b85d52a0f6ab550c3ef302b288d6439bbf881df2aedca14fa644784c22cede8dd978633e88b4d57be98135b4ef1c48fb34c0157e2fa1bd454dc29826ed82e6bee9d22d651782f8aed0859dea2359a6a19cbb0be856223e7b46fa9aada46aa91c1ba4719ca8bd29e48d9a50a962fc38f71d44e33998e0290e893dd4b12983954db42a05ff494fb438341653a4752d5a5f1cf1465817138feb0f7fabf6ea72d086b0d51aebd8025728a0cf068ec23d31d32a730274d48f4f6eb2f7fe42e34b50e295db7369c1d33083c93bff40ac6bab86fa62bd8c54b7423a8c6cf7d1e7a3a2d7c48c5eca58e8217c2bafe46a566f676edd9eb6403ce807fabab14eed11dc75fae2c4bc6d661d2a712908a388137dcc3ab71840809950ae17bda8b079113fe569a9cde55f5ec1ddbd4dcc5b120527a5e2eedd4ad3ff1a643807c31ec1c8346ba841a0a6499c225d94e391f0421a3a92f7b486bbf692a2479e9543a8e186b202bf36e9300159930b6bef4363e94d07aa55f4955402950b3adfed2a8829c0ed2bbf29823aac54c392d86d48ba2c0521f430dd564ce61db2a7af0e8354f54aba7bb273833c648482a2ec260d8cc4d9cfe430acd65a20c2ebe4d774973aaab1a3e924f3762ba24db2029a7a6f03c8ca6cdddb28b48bfe3ad891d73100ecebaf530ae06587b65889aadc3c81c40bbb31290b82e4acb402ee0929c6fd83dcfb399e3634b5f66cab2645b7f5b1d6552aa28e45427dc59164c62496bc3e825e9f0170a10d750ca735b117f45fa6a418153ffcd0f0d5d8d26d926a31697d56b9c91b902baa4cb8debcc072d9a1bb4901ccafdb56a14322c8719d4bfd8358a9f4c7a882ae4b550737a291f7ae868197f621b7da5dc23744ebdeddfad2b1b0679f86b82b8573de57d3ecb77a77146112ef673609e8608f3ef05a4e1208d0aaf57f97beebd0de02facb6469065188249c6d885ef16c087d7f6b9296c30df9d6b0bb312f72ec0fd51e62f2edfcc07261c5309d96ea9af679d6afb49266c08bd85f203d4c6fba82052ea3c53def00d5ed84b5621909b217e1abdfdd7c1985ebbc3dbaf63e01afcc680f988c053531ca960402af387b7150a7c86b413a75b46afdb01948660360db2de12f6337f6a85fe82dd2fb0abd079b6032890bfd035280ccae760fc8d2d4a58d24a33b45c3e65d0961b1002882ff094903090b94d86d8462fa2613a915d649760f802e8eb7bd269bfc32083564cd6563a597d103400f6c2f421117619d3407901c943aa0abb8208e0b7994ae5e0e7451193bd2f72bb27ee77fe4a7aba1b23a0135889c7caba6fc729b4789d241e39564bee16e06b094e6cbcd8de43a61a092e1ad70b525923efd3d4aaa0838c9c8d0a53921080e18ccad9ce9fef17ab2a9b488a4730478254f2dc4828b355f309087e85214b187e58e1f59428a002c84cc259b2e1064502f05abf938f294b622325c92b2305b67fa0ca651c0beb44321a064c6c36aa8f33d103eda0178e3a533ee998fa9ef5a3bd9ddd960d519825e05ad6d23269b12a6d93fd444c859a728c465c942313781347f9ad3e0e66cfaae5eb7b50fb5be2f514cde2f6ab814d891ee68440f176446432573fbb8ea8b3388d66242620aeb48e8f79fb60037675114429e09d0628a36a4d215257737c49524da085b3d2fc60c45d0dd6db7e94c8482f253055cc9a725d87a2effa66762e01c809d38ac9c618355b537268ec1ff35be9823e7d7cd7c5eb00853ef54ccd15223ce4d97387915e872753d3dc07c51350b631328f3790eb11680f5fa23442a3a21301e9372b3b68db7d96db2abc6cae8f1888d39a506b0a7376e18dc6cb47a22079222177b05b51e48387c7e7b925e45aeee282a3b76880d1fb3c8e88e0a3ec5436fc5e3b8236f2d494cbfcb6e1647228c101d8f1902f4073c2cb4ec020fbe87a8d880cdd8dacd4cb6663a20e7e395a5761faf6f7d7af6f8a515b7cbdf73f08adc02c986352e7aac4ceb756c198be585f08071d274fb16d85c3b785c5476472033e8e81b3e739ddffa8b3f1e872837fd1813e3416e363b6ad4b3653067de0ce5aa593bc904dce835ed8590baebd86f9844d9e5f0de346d64c365115678afd960d2f29fb3f47c081cfa6828d1fade618fa022429eb0644c1d1424e414ada523fcd6bd9d245e8c057b5cbd8d68956acdfc8c04d573526411cd3e5cc0397039bb054aa21b6ed725cbd649665b462706bca2ebc072c740ac1dc33714d619686a83d90848a2a0ceae7af0226ee19d7b193f9e05d3e7be35dcd4e702d75c190de82663a75845b8ad3967542631d8be25049474a9eb25238009363546c31c9be196a7e8c726747632e813ea25b54491cd5857a5ceba9c59302488a6861ab4e641230e339b9dfd94f9001dbdb18c1fbd24ae2d6ff499b23a5c7604d24f855f1004e422d65bdfd8e2f71c659cb7a2d2cff88ca6aed402ad4ad079132b5b517149a5771be87ea72c580bb98d565c632b219ddff0eda3710c70268eb2acff0f8d9009bf639659b88d7fce866091fde192ac0dea39b6ff39c2e9ee05a1edf58bad23dff84aea7d193d821fb3e7777265834f0b7f6f79ad6e89f33c53747bde9d45a012f858d0713967ab406684903874429695b99f9f3c2b71a629cd6f9181285904d1954360de14776a61fc5a9cc0708a07dfd8d117ec2481fabf6de0aec24f1e35629f269c16dbf2a03945177e6db341982e4fdc56d6ff40bffcbae533adfe9dd29c0c1dab05949e547caf41c1f335d6230c88559a53a92d1697fd1749ea667811bce335c64885678b1519b2cb3889a646f3aa89a8f60b3f465dee051aa26f7eb243f90782a19d98e2695b255016d0bd9ad58b0d1c78e08991531291d981d4bf7f97d50024d69b8c3af3c45ead382e2e04c841bc8bba3d09ebb609e1354553120a8a0adfd4002b02d7b6d63b8f738646890c3f809fc4631a1bb68d18aaec83bbfbfed4d0426c3d228e7f44607ee4077f308e84780902c3c8280f8c8398c52c88f04bb9b6765cc94fd0223f48cc4f0e90ee7faf91df65a397c9ce83b988e990ba0a319ade1bca079369207b342a051d95354c1f42126c8993434c47084e9343ccaa02b218e4af79900f5e67bb07928f9c18fbdb9a138efd42d421518644995f4ee41b22ebfce2a951da400f514d8bb324ad264157efb17db8f7844b5ef99e552597ddab8340cf7a71622e71d83acff7014c0aab9ed63d4de6c906e1f1ab6acbb70ecdd3ce98aa668582a160d043659181e42db544f4ce88c5e8b0f896ae32973e32f8fb28085b832001082b9698e828230a8730a9a3e6bd65e340ca0196e0f4dfec002827ff36e0cb25c543d3750e07a559cbefc283b368bd491d21e15f8e619788ffe21ad1c1904386ae602e718a57c896ea7570a5b01fa33dd5d41d3e47ec3260d6ba9a1ee8a335b78da5fb2bfe6cefb579a1047b7a540acfbca4f712c75acdb83d94ffc34bc424d3b9d0d730b2d5da5263a2515500112fc9dcce094c2feb947dae3f3c6837f657a4c08bfe56c523572ebcec3ad8117494113820be138c99f8873c5ced6ebba41de23cabb9bcbcdfed43d7ba025a30002a6e2d03a586396dd9ad582846a46acba2636858b3e4e140eeb387137e1241d78d2d7fc8babab9edb34ec7538b8d8a2603db0263c3df27e8de31dd72941e038ac97dff1d36490866da76f39eb35b417fafdf3e762a1867ae8fa5670d34a0efc0821e48671d6549cd774d3ecc04a92f4fa3a11d6bcf298dbc765fcabc7dc51ecb7bf9908fa573d49c524291ba4980d0b2e76a14116380c49e754ea0575a5e8202beec349640d7bfba58de9a59f370b89ce27a042d13db1a369b4c3ca5adf28713ec34603d799c6d4bd6161c2a18ae2e5ff141f9258a484ab0da042d400ea21bdfc016287a04e7e77f2d98b98af804efa4edb49c7c5ab33121df34a68e6f49f85ef75a2944fa5cf07989e005e09ea1d3d01f88d5d81b4815c576c588e24bc5a1adafd3c4fead5d342024f9d6730050cb93a1cd3cd106367dde8ad9902f333d0b331d9816516d52244d70abed50c3638884fcf7ffc748064009b2e5129264e0993848b6c1301184e42ead4d893595ef177543338f18aa82f6dba1950273c0d321e52854a9a40a01b0bbef7f4ae2c4c9483ecc842527289dac07a6e9834b6e303e469"}]}}}, @tclass={{0x14}}], 0x1170}}, {{&(0x7f00000033c0)={0xa, 0x4e21, 0xa1, @local}, 0x1c, &(0x7f0000003480)=[{&(0x7f0000003400)="5ff9bf58ca24cb1bf9b3e47876f82ca9a9aa49ebef3f425e2b08b8ccfd8cdd18dc7261663d2348d11a0ceb75ef75541874dbc23a60344c724a749be066268ea749a59839f121dfeda0cd99641bb1e2d22a12b0075bd32dacbed8257459ec", 0x5e}], 0x1}}, {{0x0, 0x0, &(0x7f0000003600)=[{&(0x7f00000034c0)="b33aa432504c55a73cbf952605fb35562709b5ed1d6114b21d56fb4e9fdeaf492d06655c7367d8dfee119255a33d01e1a2211914865efbb0373b2f319fba54d816419b70", 0x44}, {&(0x7f0000003540)="6cfbc4babb10f751502d5d2e22460f757d7c69492c2fc39c35460ba2a78f89e015af935c02ac86d8331ea8efdbce1ef00d85411bcbb915b702104767e9a783696bfafde15d4ae4e2e1fe30549f182ab794651d15b60eb4d7d651c56a232f0c3060ce69d16f36b6b1f0a5ec3018a47ac1c963b0ec43b1a5a0293804678747ad50da08ba53b91d889972860b9dbc2081915d10a043", 0x94}], 0x2, &(0x7f0000003640)=[@hopopts={{0x1028, 0x29, 0x36, {0x1d, 0x201, '\x00', [@ra={0x5, 0x2, 0x200}, @jumbo={0xc2, 0x4, 0x81}, @generic={0x8, 0x1000, "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"}]}}}], 0x1028}}], 0x6, 0x4000) syz_io_uring_setup(0x3c2e, &(0x7f00000048c0)={0x0, 0x1ed6, 0x8, 0x3, 0x1c4}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000004940), &(0x7f0000004980)) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:21:22 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fS,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:21:22 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:21:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x11e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1845.882806] device lo entered promiscuous mode 03:21:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_d\nmmy_encryption']) [ 1845.906558] 9pnet: Insufficient options for proto=fd [ 1845.910854] 9pnet: Could not find request transport: fS [ 1845.913885] device lo left promiscuous mode 03:21:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:21:23 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, 0x0) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX]) 03:21:23 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1846.016183] EXT4-fs (sda): Unrecognized mount option "test_d [ 1846.016183] mmy_encryption" or missing value [ 1846.060917] EXT4-fs (sda): Unrecognized mount option "test_d [ 1846.060917] mmy_encryption" or missing value [ 1846.113586] 9pnet: Insufficient options for proto=fd 03:21:39 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:21:39 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, 0x0) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX]) 03:21:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:21:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fT,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:21:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f0000000180)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) fallocate(r0, 0x1, 0xfffffffffffffff8, 0xff) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) ftruncate(r2, 0x9) r3 = fsmount(r0, 0x0, 0x80) ioctl$SCSI_IOCTL_PROBE_HOST(r3, 0x5385, &(0x7f0000000240)=ANY=[@ANYBLOB="b600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/186]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_FADVISE={0x18, 0x1, 0x0, @fd_index=0x5, 0x1, 0x0, 0x8, 0x0, 0x1}, 0x7fff) copy_file_range(r2, &(0x7f0000000300)=0xffffffffffffffff, r1, &(0x7f0000000340)=0x3, 0x20b, 0x0) r4 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000001080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) dup(r4) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x400, &(0x7f0000000080)=ANY=[@ANYRESOCT=r1, @ANYRESHEX=r0]) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r5, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) ioctl$CDROM_SET_OPTIONS(r5, 0x5320, 0x0) 03:21:39 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_d\"mmy_encryption']) 03:21:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1e01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:21:39 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1862.106053] 9pnet: Could not find request transport: fT [ 1862.123284] 9pnet: Insufficient options for proto=fd 03:21:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1862.141748] EXT4-fs (sda): Unrecognized mount option "test_d"mmy_encryption" or missing value [ 1862.146439] EXT4-fs (sda): Unrecognized mount option "test_d"mmy_encryption" or missing value [ 1862.157825] 9pnet_virtio: no channels available for device 9p 03:21:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:21:39 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_d%mmy_encryption']) 03:21:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:21:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fV,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:21:39 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, 0x0) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX]) [ 1862.289349] 9pnet: Could not find request transport: fV 03:21:39 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1862.313574] 9pnet: Insufficient options for proto=fd 03:21:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf903, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1862.346721] EXT4-fs (sda): Unrecognized mount option "test_d%mmy_encryption" or missing value [ 1862.363353] EXT4-fs (sda): Unrecognized mount option "test_d%mmy_encryption" or missing value 03:21:53 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:21:53 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:21:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_d,mmy_encryption']) 03:21:53 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x1, 0x5, 0x2, 0x8, 0x47}) 03:21:53 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:21:53 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fb,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:21:53 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:21:53 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1876.747154] 9pnet: Insufficient options for proto=fd [ 1876.804249] 9pnet: Could not find request transport: fb [ 1876.806793] EXT4-fs (sda): Unrecognized mount option "test_d" or missing value 03:21:53 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1876.830598] EXT4-fs (sda): Unrecognized mount option "test_d" or missing value 03:21:53 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {0x36}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:21:53 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:21:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dXmmy_encryption']) 03:21:53 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1876.978156] 9pnet: Insufficient options for proto=fd [ 1877.004467] EXT4-fs (sda): Unrecognized mount option "test_dXmmy_encryption" or missing value [ 1877.020550] EXT4-fs (sda): Unrecognized mount option "test_dXmmy_encryption" or missing value 03:22:11 executing program 7: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:22:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x100800, &(0x7f0000002180)=ANY=[@ANYBLOB='tr,rfd', @ANYBLOB="7ba652685532921262acceb266d99c1f656d5deec9dd7ce383c8108f5573ea4fafc5f540fc8fffada405f067b1dc3405e35d33aab092a09fb4689bde26479512f00a32949be0579ce87da17f2ff50454fdd92e5794e4da9c7dea882d3953e5cc6fa5e26cad995985c7319b83d83e7f7cf0f0a324e3ae06af6180f151cbfd"]) r2 = syz_open_dev$vcsn(&(0x7f0000000080), 0x6, 0x800) r3 = fork() r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r4, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) flock(r0, 0x1) clone3(&(0x7f0000000400)={0x90000100, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000240), {0x9}, &(0x7f0000000280)=""/21, 0x15, &(0x7f00000002c0)=""/253, &(0x7f00000003c0)=[r1, r1, r3, r1, r1, r1], 0x6, {r4}}, 0x58) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r2, 0x80286722, &(0x7f0000000100)={&(0x7f00000000c0)=""/53, 0x35, 0x1ff, 0x2}) sendmsg$AUDIT_USER(r2, &(0x7f0000002140)={&(0x7f0000001080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000002100)={&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1010}, 0x1, 0x0, 0x0, 0x8800}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r6, 0x10e, 0xb, &(0x7f0000000000)=0xba, 0x4) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(r6, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000780)={0x14, r7, 0x1}, 0x14}}, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r6, 0x84009422, &(0x7f0000000400)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r5, 0xc400941d, &(0x7f0000000240)={r8, 0x40, 0x4}) ioctl$BTRFS_IOC_BALANCE_V2(r4, 0xc4009420, &(0x7f0000002240)={0x18, 0x0, {0x6, @struct={0x9, 0x400}, 0x0, 0x0, 0x99, 0x6, 0x0, 0x401, 0x40, @usage=0x1, 0x81, 0x80, [0x80000000, 0x6, 0x2, 0x101, 0x2b780000000, 0x3]}, {0x72, @struct={0x1000, 0x598}, 0x0, 0x9, 0x101, 0x5, 0x5, 0x8, 0x40, @struct={0x7fffffff, 0xfffeffff}, 0x80000000, 0x4, [0x433, 0x6, 0x4, 0x8, 0x6, 0x8]}, {0x2, @struct={0xf93, 0x461}, r8, 0x2, 0x7, 0x3, 0xbaa, 0x7, 0x20, @usage=0x9, 0x6, 0x3, [0x89e6, 0x9, 0x3, 0x2, 0x3, 0x3]}, {0x1b, 0x5, 0x3}}) 03:22:11 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:22:11 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:22:11 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:22:11 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:22:11 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fg,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:22:11 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dcmmy_encryption']) [ 1894.122641] 9pnet: Could not find request transport: fg [ 1894.147950] EXT4-fs (sda): Unrecognized mount option "test_dcmmy_encryption" or missing value [ 1894.162451] EXT4-fs (sda): Unrecognized mount option "test_dcmmy_encryption" or missing value 03:22:11 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1e01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:22:11 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:22:11 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_ddmmy_encryption']) 03:22:11 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1894.378640] EXT4-fs (sda): Unrecognized mount option "test_ddmmy_encryption" or missing value 03:22:11 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:22:11 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fq,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:22:11 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1894.426516] EXT4-fs (sda): Unrecognized mount option "test_ddmmy_encryption" or missing value 03:22:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {0x803fa}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) mount$9p_fd(0x20000000, &(0x7f00000001c0)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="7241f7ee7000000000000000", @ANYRESOCT, @ANYRES64=r1]) mount$tmpfs(0x0, &(0x7f0000000300)='./file1\x00', &(0x7f0000000340), 0x300430, &(0x7f0000000380)={[{@huge_always}, {@huge_within_size}, {@huge_never}, {@mode={'mode', 0x3d, 0xc55}}, {@mode={'mode', 0x3d, 0x4}}], [{@seclabel}, {@appraise}, {@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@appraise}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) socketpair(0x1d, 0x5, 0x7fff, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = accept4$inet(r3, &(0x7f0000000480)={0x2, 0x0, @private}, &(0x7f00000004c0)=0x10, 0x80000) fcntl$dupfd(r4, 0x406, r2) r5 = dup(r3) mknodat(r0, &(0x7f00000002c0)='./file1\x00', 0x8000, 0xab4) setxattr$security_capability(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240), &(0x7f0000000280)=@v2={0x2000000, [{0x8001, 0x5}, {0x7, 0x3}]}, 0x0, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r5, 0x40089416, 0x0) [ 1894.522859] 9pnet: Could not find request transport: fq [ 1894.542431] 9pnet_virtio: no channels available for device 03:22:25 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:22:25 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dimmy_encryption']) 03:22:25 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {0x803fa}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) mount$9p_fd(0x20000000, &(0x7f00000001c0)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="7241f7ee7000000000000000", @ANYRESOCT, @ANYRES64=r1]) mount$tmpfs(0x0, &(0x7f0000000300)='./file1\x00', &(0x7f0000000340), 0x300430, &(0x7f0000000380)={[{@huge_always}, {@huge_within_size}, {@huge_never}, {@mode={'mode', 0x3d, 0xc55}}, {@mode={'mode', 0x3d, 0x4}}], [{@seclabel}, {@appraise}, {@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@appraise}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) socketpair(0x1d, 0x5, 0x7fff, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = accept4$inet(r3, &(0x7f0000000480)={0x2, 0x0, @private}, &(0x7f00000004c0)=0x10, 0x80000) fcntl$dupfd(r4, 0x406, r2) r5 = dup(r3) mknodat(r0, &(0x7f00000002c0)='./file1\x00', 0x8000, 0xab4) setxattr$security_capability(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240), &(0x7f0000000280)=@v2={0x2000000, [{0x8001, 0x5}, {0x7, 0x3}]}, 0x0, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r5, 0x40089416, 0x0) 03:22:25 executing program 6: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) openat(r0, &(0x7f0000000080)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 1908.739991] 9pnet_virtio: no channels available for device 03:22:25 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:22:25 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:22:25 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fs,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:22:25 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1908.756653] EXT4-fs (sda): Unrecognized mount option "test_dimmy_encryption" or missing value [ 1908.761701] 9pnet: Could not find request transport: fs [ 1908.773209] EXT4-fs (sda): Unrecognized mount option "test_dimmy_encryption" or missing value 03:22:25 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:22:25 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:22:25 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dlmmy_encryption']) 03:22:26 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:22:26 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1909.033313] EXT4-fs (sda): Unrecognized mount option "test_dlmmy_encryption" or missing value [ 1909.056839] EXT4-fs (sda): Unrecognized mount option "test_dlmmy_encryption" or missing value 03:22:26 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:22:26 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1e010000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:22:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fu,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:22:26 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf903, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1909.134839] 9pnet: Could not find request transport: fu 03:22:40 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x11e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:22:40 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fw,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:22:40 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1923.301385] 9pnet: Could not find request transport: fw 03:22:40 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dommy_encryption']) 03:22:40 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:22:40 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x21, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:22:40 executing program 6: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x15b402, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e20}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e23}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x8090}, 0x24004014) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = dup2(r5, r4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x1}}, './file0\x00'}) r8 = syz_genetlink_get_family_id$batadv(0x0, r6) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r7, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, r8, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0xfec6, 0x39, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x200000c0}, 0x14050884) r9 = socket$packet(0x11, 0x3, 0x300) r10 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_add_memb(r9, 0x107, 0x1, &(0x7f0000000100)={r11, 0x3, 0x6}, 0x10) setsockopt$packet_add_memb(r9, 0x107, 0x1, &(0x7f0000000080)={r11, 0x1, 0x6, @dev}, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r8, 0x2, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r11}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x24040010}, 0x40040) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r8, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x455}, 0x4) 03:22:40 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1923.317689] EXT4-fs (sda): Unrecognized mount option "test_dommy_encryption" or missing value [ 1923.321248] EXT4-fs (sda): Unrecognized mount option "test_dommy_encryption" or missing value [ 1923.357793] EXT4-fs (sda): test_dummy_encryption option not supported 03:22:40 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dpmmy_encryption']) 03:22:40 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x70000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:22:40 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:22:40 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:22:40 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 1) [ 1923.500666] EXT4-fs (sda): Unrecognized mount option "test_dpmmy_encryption" or missing value [ 1923.512386] EXT4-fs (sda): Unrecognized mount option "test_dpmmy_encryption" or missing value 03:22:40 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:22:40 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1923.565833] FAULT_INJECTION: forcing a failure. [ 1923.565833] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1923.568440] CPU: 1 PID: 24177 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 1923.570176] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1923.571948] Call Trace: [ 1923.572529] dump_stack+0x107/0x167 [ 1923.573317] should_fail.cold+0x5/0xa [ 1923.574164] _copy_from_user+0x2e/0x1b0 [ 1923.575029] perf_copy_attr+0x11a/0x8b0 [ 1923.575898] __do_sys_perf_event_open+0xb9/0x2cb0 [ 1923.576942] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1923.578002] ? perf_event_set_output+0x5b0/0x5b0 [ 1923.579023] ? wait_for_completion_io+0x270/0x270 [ 1923.580085] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1923.581218] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1923.582337] do_syscall_64+0x33/0x40 [ 1923.583143] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1923.584240] RIP: 0033:0x7fb9acc68b19 [ 1923.585042] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1923.588952] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1923.590589] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 1923.592116] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1923.593641] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1923.595192] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1923.596718] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 03:23:04 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf9030000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:23:04 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3f9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:23:04 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:23:04 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 2) 03:23:04 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0, 0xd5) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_mount_image$msdos(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0xffffffffffffff80, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000240)="813f334ffdec0780f553a4abd508c1db67df402e80f11f26cf233878d0fc5d4078295a9ea469ca88da0e7754b46542358d5005ce930c53ddfbd3c6c5245a506625857aa52e1d704d957a62199f30bc7bfe11ad472ad61878d3de4a35c367bfb7d40085882febf3512bd544d65c2ca9acfd576311e7808a43ee4c47fcdce6168fd1a1feefa30705b1", 0x88, 0x6}, {&(0x7f0000000300)="1fff7948aa47a54f1e960dbd9579dc65a8f2901c4ac14933f79e08d1759a9b0928f23892c3955df237306305d63198adeb8e2a9a724eda6cd87012362ce0e73b508dfe8b74ddddb2582e09a78dbeff40b5255a045b3bb6862b249c7c92e07cc3f73ed5d3f5a7174c31895ac1af9abecf6ad798ff6b21fdb4881bdf09d57d883b37c8f65f29b48aca75c9ecfc7a5d26761cb767acfba50c46eb4a0ebb7a101b2617d995c24fd1530b285195af63234b9d0ddeb540060b8e03889e15377d831031e9af2748d722635d6ef43220727e6b359318fd5d463004dd4ce88c", 0xdb, 0x8}, {&(0x7f0000000180)="b3c0f1986b0e04641c3e9ec126ec47875ac01f5bac730b34ef3064d9004ea8228524da656cf2cf151f04db021fb39c87e4a5d43028e6c1928d0e343b411f347506aa8b5f13ed3b764dc89741a18a831975eca1ff91a00b3d1a0ded8e9ce47c9eb4d20e3ace1668cfa397e34671e20bff0a8108043df89f5d2fd5", 0x7a, 0x5}, {&(0x7f0000000400)="8f2ffe9210d0c6a4b5c3fa0cc31d96726a707432d6eb77ead343ec3eabd3305324bf57fe28ca84f440284816f92ad349ca30f2322340fd3310e2f7d88a97adf8b75ca3b6745b8410959128f482987357f9ac7ef1f9af4da0809c2f4b16eb809edc86ba77a37a9b83e69e04cd99b228e37745c32ae353c299def67a3f479c72592cde384f2bac702004894557f8", 0x8d, 0x1ff}], 0x20a1c02, &(0x7f0000000100)={[{@dots}, {@dots}, {@dots}, {@fat=@debug}, {@dots}], [{@uid_lt={'uid<', 0xffffffffffffffff}}]}) execveat(r0, &(0x7f0000000540)='./file1\x00', &(0x7f00000007c0)=[&(0x7f0000000580)='9p\x00', &(0x7f00000005c0)='.@{\x00', &(0x7f0000000600)='9p\x00', &(0x7f0000000640)='*\'\x00', &(0x7f0000000680)=':.+\x00', &(0x7f0000000980)='}\x85\x00', &(0x7f0000000700)=':*\x00', &(0x7f0000000740)='9p\x00', &(0x7f0000000780)='9p\x00'], &(0x7f0000000940)=[&(0x7f0000000840)='\x97,\x00', &(0x7f0000000880)='9p\x00'], 0x0) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="74720500c800000000000000", @ANYRESHEX]) 03:23:04 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:23:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dsmmy_encryption']) 03:23:04 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd\"rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1947.233726] 9pnet: Could not find request transport: fd"rfdno=0x0000000000000003 [ 1947.238629] EXT4-fs (sda): Unrecognized mount option "test_dsmmy_encryption" or missing value [ 1947.248778] EXT4-fs (sda): Unrecognized mount option "test_dsmmy_encryption" or missing value 03:23:04 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:23:04 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1947.281665] FAULT_INJECTION: forcing a failure. [ 1947.281665] name failslab, interval 1, probability 0, space 0, times 0 [ 1947.283231] CPU: 0 PID: 24217 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 1947.284173] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1947.285295] Call Trace: [ 1947.285409] 9pnet_virtio: no channels available for device 9p [ 1947.285666] dump_stack+0x107/0x167 [ 1947.287473] should_fail.cold+0x5/0xa [ 1947.287998] ? perf_event_alloc.part.0+0x5b/0x2b30 [ 1947.288672] should_failslab+0x5/0x20 [ 1947.289192] kmem_cache_alloc_trace+0x55/0x360 [ 1947.289821] perf_event_alloc.part.0+0x5b/0x2b30 [ 1947.290481] __do_sys_perf_event_open+0x580/0x2cb0 [ 1947.291006] ? lapic_timer_set_periodic+0x60/0x60 [ 1947.291658] ? perf_event_set_output+0x5b0/0x5b0 [ 1947.292162] ? tick_program_event+0xa8/0x140 [ 1947.292767] ? __startup_64+0x7/0x3b0 [ 1947.293295] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1947.293927] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1947.294495] do_syscall_64+0x33/0x40 [ 1947.294896] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1947.295448] RIP: 0033:0x7fb9acc68b19 [ 1947.295847] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1947.297787] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1947.298600] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 1947.299351] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1947.300104] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1947.300858] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1947.301605] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 03:23:04 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) 03:23:04 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:23:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dxmmy_encryption']) 03:23:04 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:23:04 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:23:04 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1947.454469] EXT4-fs (sda): Unrecognized mount option "test_dxmmy_encryption" or missing value [ 1947.460337] EXT4-fs (sda): Unrecognized mount option "test_dxmmy_encryption" or missing value 03:23:18 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) 03:23:18 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 3) 03:23:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_du\nmy_encryption']) 03:23:18 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,\"fdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:23:18 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0xcc000, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:23:18 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1961.745130] FAULT_INJECTION: forcing a failure. [ 1961.745130] name failslab, interval 1, probability 0, space 0, times 0 [ 1961.746790] CPU: 0 PID: 24446 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 1961.747574] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1961.748523] Call Trace: [ 1961.748830] dump_stack+0x107/0x167 [ 1961.749248] should_fail.cold+0x5/0xa [ 1961.749695] ? create_object.isra.0+0x3a/0xa20 [ 1961.750225] should_failslab+0x5/0x20 [ 1961.750670] kmem_cache_alloc+0x5b/0x360 [ 1961.751149] ? __lockdep_reset_lock+0x180/0x180 [ 1961.751682] create_object.isra.0+0x3a/0xa20 [ 1961.752184] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1961.752771] kmem_cache_alloc_trace+0x151/0x360 [ 1961.753310] perf_event_alloc.part.0+0x5b/0x2b30 [ 1961.753855] __do_sys_perf_event_open+0x580/0x2cb0 [ 1961.754419] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1961.754985] ? perf_event_set_output+0x5b0/0x5b0 [ 1961.755534] ? wait_for_completion_io+0x270/0x270 [ 1961.756117] ? __startup_64+0x7/0x3b0 [ 1961.756576] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1961.757205] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1961.757819] do_syscall_64+0x33/0x40 [ 1961.758267] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1961.758883] RIP: 0033:0x7fb9acc68b19 [ 1961.759307] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1961.761512] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1961.762413] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 1961.763270] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1961.764070] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1961.764915] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1961.765766] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 03:23:18 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:23:18 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1961.785877] EXT4-fs (sda): Unrecognized mount option "test_du [ 1961.785877] my_encryption" or missing value [ 1961.788353] 9pnet: Insufficient options for proto=fd [ 1961.792573] EXT4-fs (sda): Unrecognized mount option "test_du [ 1961.792573] my_encryption" or missing value 03:23:18 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:23:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_du\"my_encryption']) 03:23:18 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1961.878561] EXT4-fs (sda): Unrecognized mount option "test_du"my_encryption" or missing value 03:23:18 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,,fdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1961.892849] EXT4-fs (sda): Unrecognized mount option "test_du"my_encryption" or missing value 03:23:18 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 4) 03:23:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_du%my_encryption']) [ 1961.944086] 9pnet: Insufficient options for proto=fd 03:23:19 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1961.969047] FAULT_INJECTION: forcing a failure. [ 1961.969047] name failslab, interval 1, probability 0, space 0, times 0 [ 1961.970356] CPU: 0 PID: 24687 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 1961.971132] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1961.972033] Call Trace: [ 1961.972322] dump_stack+0x107/0x167 [ 1961.972736] should_fail.cold+0x5/0xa [ 1961.973152] ? alloc_trace_kprobe+0x58/0x510 [ 1961.973625] should_failslab+0x5/0x20 [ 1961.974035] __kmalloc+0x72/0x3f0 [ 1961.974420] alloc_trace_kprobe+0x58/0x510 [ 1961.974916] ? __startup_64+0x7/0x3b0 [ 1961.975327] ? __startup_64+0x7/0x3b0 [ 1961.975750] ? __startup_64+0x7/0x3b0 [ 1961.976162] ? __startup_64+0x7/0x3b0 [ 1961.976577] create_local_trace_kprobe+0x4c/0x3b0 [ 1961.977111] perf_kprobe_init+0x18c/0x280 [ 1961.977561] perf_kprobe_event_init+0xf8/0x1c0 [ 1961.978064] perf_try_init_event+0x130/0x570 [ 1961.978564] perf_event_alloc.part.0+0xd96/0x2b30 [ 1961.979124] __do_sys_perf_event_open+0x580/0x2cb0 [ 1961.979683] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1961.980216] ? perf_event_set_output+0x5b0/0x5b0 [ 1961.980736] ? wait_for_completion_io+0x270/0x270 [ 1961.981286] ? __startup_64+0x7/0x3b0 [ 1961.981716] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1961.982294] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1961.982870] do_syscall_64+0x33/0x40 [ 1961.983293] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1961.983877] RIP: 0033:0x7fb9acc68b19 [ 1961.984301] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1961.986308] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1961.987179] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 1961.987963] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1961.988748] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1961.989534] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1961.990330] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 [ 1961.991205] trace_kprobe: Failed to allocate trace_probe.(-12) [ 1962.016886] EXT4-fs (sda): Unrecognized mount option "test_du%my_encryption" or missing value [ 1962.020832] EXT4-fs (sda): Unrecognized mount option "test_du%my_encryption" or missing value 03:23:32 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:23:32 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 5) 03:23:32 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) 03:23:32 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:23:32 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) openat(r0, &(0x7f00000010c0)='./file1\x00', 0x4000, 0x1) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x5, 0x4, 0x7f, 0xc8, 0x0, 0x7f, 0x8a, 0x9, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, @perf_config_ext={0x2, 0xcc}, 0x19080, 0x1, 0xd, 0x3, 0x7fffffff, 0x7fffffff, 0x6, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x9, r0, 0x9) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) r2 = syz_open_procfs(r1, &(0x7f0000001080)='schedstat\x00') pread64(r2, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) ioctl$LOOP_CLR_FD(r2, 0x4c01) 03:23:32 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_du,my_encryption']) 03:23:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,r\"dno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:23:32 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1975.675248] 9pnet: Insufficient options for proto=fd 03:23:32 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1e010000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1975.718679] 9pnet: Insufficient options for proto=fd [ 1975.721111] EXT4-fs (sda): Unrecognized mount option "test_du" or missing value [ 1975.728037] FAULT_INJECTION: forcing a failure. [ 1975.728037] name failslab, interval 1, probability 0, space 0, times 0 [ 1975.730497] CPU: 0 PID: 24825 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 1975.731948] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1975.733637] Call Trace: [ 1975.734177] dump_stack+0x107/0x167 [ 1975.734920] should_fail.cold+0x5/0xa [ 1975.735682] ? create_object.isra.0+0x3a/0xa20 [ 1975.736597] should_failslab+0x5/0x20 [ 1975.737357] kmem_cache_alloc+0x5b/0x360 [ 1975.738170] create_object.isra.0+0x3a/0xa20 [ 1975.739061] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1975.740090] __kmalloc+0x16e/0x3f0 [ 1975.740848] alloc_trace_kprobe+0x58/0x510 [ 1975.741703] ? __startup_64+0x7/0x3b0 [ 1975.742484] ? __startup_64+0x7/0x3b0 [ 1975.743278] ? __startup_64+0x7/0x3b0 [ 1975.744039] ? __startup_64+0x7/0x3b0 [ 1975.744789] create_local_trace_kprobe+0x4c/0x3b0 [ 1975.745766] perf_kprobe_init+0x18c/0x280 [ 1975.746613] perf_kprobe_event_init+0xf8/0x1c0 [ 1975.747533] perf_try_init_event+0x130/0x570 [ 1975.748426] perf_event_alloc.part.0+0xd96/0x2b30 [ 1975.749406] __do_sys_perf_event_open+0x580/0x2cb0 [ 1975.750393] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1975.751376] ? perf_event_set_output+0x5b0/0x5b0 [ 1975.752314] ? wait_for_completion_io+0x270/0x270 [ 1975.753280] ? __startup_64+0x7/0x3b0 [ 1975.754055] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1975.755112] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1975.756154] do_syscall_64+0x33/0x40 [ 1975.756894] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1975.757914] RIP: 0033:0x7fb9acc68b19 [ 1975.758671] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1975.762329] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1975.763875] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 1975.765294] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1975.766737] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1975.768152] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1975.769673] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 [ 1975.772714] EXT4-fs (sda): Unrecognized mount option "test_du" or missing value 03:23:32 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:23:32 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:23:32 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dum\ny_encryption']) 03:23:32 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:23:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,r,dno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1975.925602] EXT4-fs (sda): Unrecognized mount option "test_dum [ 1975.925602] y_encryption" or missing value [ 1975.933472] EXT4-fs (sda): Unrecognized mount option "test_dum [ 1975.933472] y_encryption" or missing value 03:23:32 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x70000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:23:32 executing program 6: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6}}, &(0x7f0000000100)=0xe8) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r0, r1, r2) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:23:32 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 6) [ 1975.967716] 9pnet: Insufficient options for proto=fd [ 1975.976454] FAULT_INJECTION: forcing a failure. [ 1975.976454] name failslab, interval 1, probability 0, space 0, times 0 [ 1975.977704] CPU: 1 PID: 25021 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 1975.978455] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1975.979386] Call Trace: [ 1975.979688] dump_stack+0x107/0x167 [ 1975.980084] should_fail.cold+0x5/0xa [ 1975.980506] ? create_object.isra.0+0x3a/0xa20 [ 1975.981007] should_failslab+0x5/0x20 [ 1975.981419] kmem_cache_alloc+0x5b/0x360 [ 1975.981858] create_object.isra.0+0x3a/0xa20 [ 1975.982343] kmemleak_alloc_percpu+0xa0/0x100 [ 1975.982869] pcpu_alloc+0x4e2/0x12f0 [ 1975.983289] alloc_trace_kprobe+0x78/0x510 [ 1975.983744] ? __startup_64+0x7/0x3b0 [ 1975.984156] ? __startup_64+0x7/0x3b0 [ 1975.984569] ? __startup_64+0x7/0x3b0 [ 1975.984987] ? __startup_64+0x7/0x3b0 [ 1975.985400] create_local_trace_kprobe+0x4c/0x3b0 [ 1975.985925] perf_kprobe_init+0x18c/0x280 [ 1975.986375] perf_kprobe_event_init+0xf8/0x1c0 [ 1975.986879] perf_try_init_event+0x130/0x570 [ 1975.987361] perf_event_alloc.part.0+0xd96/0x2b30 [ 1975.987884] __do_sys_perf_event_open+0x580/0x2cb0 [ 1975.988412] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1975.988944] ? perf_event_set_output+0x5b0/0x5b0 [ 1975.989446] ? wait_for_completion_io+0x270/0x270 [ 1975.989975] ? __startup_64+0x7/0x3b0 [ 1975.990396] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1975.990980] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1975.991535] do_syscall_64+0x33/0x40 [ 1975.991938] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1975.992483] RIP: 0033:0x7fb9acc68b19 [ 1975.992882] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1975.994876] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1975.995693] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 1975.996456] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1975.997224] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1975.998026] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1975.998833] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 [ 1976.021664] 9pnet: Insufficient options for proto=fd 03:23:48 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="56d030940bf46e712080dd60083614b8", @ANYRESHEX]) 03:23:48 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dum\"y_encryption']) 03:23:48 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:23:48 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1e01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:23:48 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:23:48 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf9030000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:23:48 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 7) 03:23:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,r.dno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 1991.768696] FAULT_INJECTION: forcing a failure. [ 1991.768696] name failslab, interval 1, probability 0, space 0, times 0 [ 1991.771292] CPU: 0 PID: 25242 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 1991.772862] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1991.774695] Call Trace: [ 1991.775307] dump_stack+0x107/0x167 [ 1991.776128] should_fail.cold+0x5/0xa [ 1991.776978] ? create_object.isra.0+0x3a/0xa20 [ 1991.777993] should_failslab+0x5/0x20 [ 1991.778852] kmem_cache_alloc+0x5b/0x360 [ 1991.779785] create_object.isra.0+0x3a/0xa20 [ 1991.780783] kmemleak_alloc_percpu+0xa0/0x100 [ 1991.781786] pcpu_alloc+0x4e2/0x12f0 [ 1991.782649] alloc_trace_kprobe+0x78/0x510 [ 1991.783599] ? __startup_64+0x7/0x3b0 [ 1991.784451] ? __startup_64+0x7/0x3b0 [ 1991.785304] ? __startup_64+0x7/0x3b0 [ 1991.786153] ? __startup_64+0x7/0x3b0 [ 1991.787024] create_local_trace_kprobe+0x4c/0x3b0 [ 1991.788115] perf_kprobe_init+0x18c/0x280 [ 1991.789055] perf_kprobe_event_init+0xf8/0x1c0 [ 1991.790086] perf_try_init_event+0x130/0x570 [ 1991.791103] perf_event_alloc.part.0+0xd96/0x2b30 [ 1991.792191] __do_sys_perf_event_open+0x580/0x2cb0 [ 1991.793298] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1991.794370] ? perf_event_set_output+0x5b0/0x5b0 [ 1991.795438] ? wait_for_completion_io+0x270/0x270 [ 1991.796518] ? __startup_64+0x7/0x3b0 [ 1991.797382] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1991.798552] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1991.799700] do_syscall_64+0x33/0x40 [ 1991.800550] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1991.801668] RIP: 0033:0x7fb9acc68b19 [ 1991.802487] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1991.806518] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1991.808189] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 1991.809753] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1991.811333] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1991.812905] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1991.814478] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 [ 1991.823150] 9pnet: Insufficient options for proto=fd [ 1991.828865] EXT4-fs (sda): Unrecognized mount option "test_dum"y_encryption" or missing value 03:23:48 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:23:48 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:23:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,r/dno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:23:48 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:23:48 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:23:48 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dum%y_encryption']) 03:23:49 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 1) 03:23:49 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 8) [ 1991.988359] EXT4-fs (sda): Unrecognized mount option "test_dum%y_encryption" or missing value [ 1992.002555] EXT4-fs (sda): Unrecognized mount option "test_dum%y_encryption" or missing value [ 1992.008532] FAULT_INJECTION: forcing a failure. [ 1992.008532] name failslab, interval 1, probability 0, space 0, times 0 [ 1992.009830] CPU: 1 PID: 25465 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 1992.010602] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1992.011536] Call Trace: [ 1992.011841] dump_stack+0x107/0x167 [ 1992.012257] should_fail.cold+0x5/0xa [ 1992.012699] ? trace_probe_init+0x6a/0x4e0 [ 1992.013179] should_failslab+0x5/0x20 [ 1992.013618] __kmalloc+0x72/0x3f0 [ 1992.014015] trace_probe_init+0x6a/0x4e0 [ 1992.014472] alloc_trace_kprobe+0x2ce/0x510 [ 1992.014960] ? __startup_64+0x7/0x3b0 [ 1992.015392] ? __startup_64+0x7/0x3b0 [ 1992.015803] ? __startup_64+0x7/0x3b0 [ 1992.016229] ? __startup_64+0x7/0x3b0 [ 1992.016661] create_local_trace_kprobe+0x4c/0x3b0 [ 1992.017193] perf_kprobe_init+0x18c/0x280 [ 1992.017667] perf_kprobe_event_init+0xf8/0x1c0 [ 1992.018172] perf_try_init_event+0x130/0x570 [ 1992.018674] perf_event_alloc.part.0+0xd96/0x2b30 [ 1992.019213] __do_sys_perf_event_open+0x580/0x2cb0 [ 1992.019770] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1992.020302] ? perf_event_set_output+0x5b0/0x5b0 [ 1992.020830] ? wait_for_completion_io+0x270/0x270 [ 1992.021381] ? __startup_64+0x7/0x3b0 [ 1992.021688] 9pnet: Insufficient options for proto=fd [ 1992.021822] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1992.023528] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1992.024106] do_syscall_64+0x33/0x40 [ 1992.024523] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1992.025090] RIP: 0033:0x7fb9acc68b19 [ 1992.025513] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1992.027563] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1992.028415] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 1992.029217] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1992.030020] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1992.030819] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1992.031619] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 [ 1992.032479] trace_kprobe: Failed to allocate trace_probe.(-12) 03:23:49 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) r0 = fsopen(&(0x7f0000000600)='gfs2\x00', 0x0) fsetxattr$security_capability(r0, &(0x7f0000000640), &(0x7f0000000680)=@v2={0x2000000, [{0x401, 0xffff}, {0x1f, 0x5}]}, 0x14, 0x1) r1 = syz_mount_image$msdos(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x70000, 0x5, &(0x7f0000000500)=[{&(0x7f0000000240)="8b80345f7e11b5b3e35fc45199f6159e5b44970d1d38885539686c4733435d7f030854584052951cfef0855b0b36bb450b6d182fca7e6a10e188f034a824c0f63d7fe499511558f4b3844305079cc0e6a91430ce8714e2d5090b2f6f34ec2335fbab35c47b530a86c53f42cd7fe89c0d8dd92257f2e1b9ba47eac7d1252c13166fd2384a527bd15a0741e3f37783d13d154c42ee8bc0cfbaacd3f8db3ecc732d6dbc933b734fe12dc90aef63599ba23de244fc4ae31ab97f911a240f3a148ba67da97556ed5ef5db569b", 0xca, 0x8}, {&(0x7f0000000340)="5a97160d645fc0c44e5451f2a598550b83467e6083a69fe70f7c6fa4dde6b9744aa66271b3201de5f832ca47cbd7cb9c139d051c80b4739f4af27cc9bc0e6887e61831c046deb726af4f21f79589869c68026d15eb5d5dd3b42c021bdbf601e998ce83c313f6aa71ed5e715854cecb8fc9118374c5d0df8f2aa079552f4048921dc52b4996600ce3ad9e1c01def27180", 0x90, 0x9}, {&(0x7f0000000100)="6aae4c3250e6f825c96635c5afd732c907f58c37235b93f408d6b6e63af32684ea6e6784a447ea2d35c03e2e17034e9a", 0x30, 0xa7}, {&(0x7f0000000180)="1db7432a7878d4c12123f6c6ea235e2f4300d99537950451bd9b170086f294e100372a6885c36a22c64d0c3b286007f83d5df5d2816c97c3372f774d97c03d5c01996a4d1da71d6e1e4af49bc9c5", 0x4e, 0x9}, {&(0x7f0000000400)="88aaa38522106442c809c7ffc0704908c6a38b1e320594af2128ce0a4fd8f8297aa821be587478b62f535bc8bbae381e1d3e581e37a2358da37b0b45b3a60120dfcccef435096224120b30f327f727d3b6f9e7aa970869cb201bfe4a6df09405fa99375f53fd894af9ccc8c67d443cff4a446ca8ff3712167d4db617bc41449ed57699d7f57f75ae65fc2e1ebe761845f331ba8c51986ddfa09f6120068164a403080cdba210a9643d28ad1a598f446ff7021ec181ec6e46760f817fec3e570c4d82dff19057e3e91f1e0964077b2c9fbe5a44938b1bff9c947f6e04582a0c223f0b54e9977338", 0xe7, 0x2}], 0x200000, &(0x7f0000000580)={[{@dots}, {@fat=@discard}], [{@smackfsdef={'smackfsdef', 0x3d, '9p\x00'}}, {@seclabel}, {@subj_user={'subj_user', 0x3d, '\xfa!-^%.\\@]'}}]}) openat(r1, &(0x7f00000005c0)='./file1\x00', 0x501541, 0x0) 03:23:49 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:23:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:23:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dum,y_encryption']) [ 1992.098678] 9pnet: Insufficient options for proto=fd 03:23:49 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1e01000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1992.116144] EXT4-fs (sda): Unrecognized mount option "test_dum" or missing value 03:23:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1992.121157] EXT4-fs (sda): Unrecognized mount option "test_dum" or missing value 03:23:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dumm\n_encryption']) 03:23:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1992.179683] FAULT_INJECTION: forcing a failure. [ 1992.179683] name failslab, interval 1, probability 0, space 0, times 0 [ 1992.181134] CPU: 1 PID: 25478 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 1992.181886] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1992.182781] Call Trace: [ 1992.183114] dump_stack+0x107/0x167 [ 1992.183515] should_fail.cold+0x5/0xa [ 1992.183931] ? mb_cache_entry_create+0xbf/0x910 [ 1992.184445] should_failslab+0x5/0x20 [ 1992.184866] kmem_cache_alloc+0x5b/0x360 [ 1992.185316] mb_cache_entry_create+0xbf/0x910 [ 1992.185808] ? ext4_xattr_check_entries+0x337/0x3c0 [ 1992.186354] ext4_xattr_get+0x563/0xa00 [ 1992.186800] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 1992.187321] ? ext4_xattr_security_set+0x40/0x40 [ 1992.187842] __vfs_getxattr+0xe3/0x150 [ 1992.188268] ? __vfs_setxattr+0x180/0x180 [ 1992.188723] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1992.189321] cap_inode_need_killpriv+0x3c/0x60 [ 1992.189825] security_inode_need_killpriv+0x46/0xa0 [ 1992.190393] file_remove_privs+0x30f/0x540 [ 1992.190887] ? init_once+0x230/0x230 [ 1992.191297] ? generic_write_checks+0x2ad/0x390 [ 1992.191812] ? generic_write_check_limits+0x2a0/0x2a0 [ 1992.192378] ? down_write+0xe0/0x160 [ 1992.192798] ? down_write_killable+0x180/0x180 [ 1992.193316] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1992.193914] file_modified+0x14/0xa0 [ 1992.194333] ext4_file_write_iter+0x906/0x18e0 [ 1992.194863] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1992.195380] new_sync_write+0x42c/0x660 [ 1992.195821] ? new_sync_read+0x6f0/0x6f0 [ 1992.196275] ? ksys_write+0x12d/0x260 [ 1992.196709] ? lock_release+0x6b0/0x6b0 [ 1992.197163] ? selinux_file_permission+0x36/0x510 [ 1992.197707] ? __fget_files+0x296/0x480 [ 1992.198163] vfs_write+0x747/0xa30 [ 1992.198566] ksys_write+0x12d/0x260 [ 1992.198972] ? __ia32_sys_read+0xb0/0xb0 [ 1992.199428] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1992.200017] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1992.200602] do_syscall_64+0x33/0x40 [ 1992.201020] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1992.201597] RIP: 0033:0x7f06a9247b19 [ 1992.202006] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1992.204068] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1992.204888] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 1992.205702] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 1992.206517] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1992.207323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1992.208118] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:23:49 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 9) [ 1992.256834] EXT4-fs (sda): Unrecognized mount option "test_dumm [ 1992.256834] _encryption" or missing value [ 1992.272749] FAULT_INJECTION: forcing a failure. [ 1992.272749] name failslab, interval 1, probability 0, space 0, times 0 [ 1992.274006] CPU: 1 PID: 25692 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 1992.274750] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1992.275668] Call Trace: [ 1992.275970] dump_stack+0x107/0x167 [ 1992.276366] should_fail.cold+0x5/0xa [ 1992.276782] ? create_object.isra.0+0x3a/0xa20 [ 1992.277279] should_failslab+0x5/0x20 [ 1992.277692] kmem_cache_alloc+0x5b/0x360 [ 1992.278154] create_object.isra.0+0x3a/0xa20 [ 1992.278635] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1992.279195] __kmalloc+0x16e/0x3f0 [ 1992.279585] trace_probe_init+0x6a/0x4e0 [ 1992.280032] alloc_trace_kprobe+0x2ce/0x510 [ 1992.280498] ? __startup_64+0x7/0x3b0 [ 1992.280908] ? __startup_64+0x7/0x3b0 [ 1992.281320] ? __startup_64+0x7/0x3b0 [ 1992.281735] ? __startup_64+0x7/0x3b0 [ 1992.282152] create_local_trace_kprobe+0x4c/0x3b0 [ 1992.282698] perf_kprobe_init+0x18c/0x280 [ 1992.283179] perf_kprobe_event_init+0xf8/0x1c0 [ 1992.283688] perf_try_init_event+0x130/0x570 [ 1992.284194] perf_event_alloc.part.0+0xd96/0x2b30 [ 1992.284729] __do_sys_perf_event_open+0x580/0x2cb0 [ 1992.285282] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1992.285823] ? perf_event_set_output+0x5b0/0x5b0 [ 1992.286342] ? wait_for_completion_io+0x270/0x270 [ 1992.286890] ? __startup_64+0x7/0x3b0 [ 1992.287313] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1992.287898] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1992.288475] do_syscall_64+0x33/0x40 [ 1992.288898] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1992.289482] RIP: 0033:0x7fb9acc68b19 [ 1992.289902] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1992.291943] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1992.292797] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 1992.293586] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1992.294384] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1992.295181] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1992.295977] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 [ 1992.309248] EXT4-fs (sda): Unrecognized mount option "test_dumm [ 1992.309248] _encryption" or missing value 03:24:05 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rf\"no=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:24:05 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 2) 03:24:05 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 10) 03:24:05 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:24:05 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:24:05 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='d\x00'/12, @ANYRESHEX]) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000080)={0x4, 0xffffffff, 0x7f}) 03:24:05 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:24:05 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dumm\"_encryption']) [ 2008.733259] 9pnet: Insufficient options for proto=fd [ 2008.745722] FAULT_INJECTION: forcing a failure. [ 2008.745722] name failslab, interval 1, probability 0, space 0, times 0 [ 2008.748392] CPU: 1 PID: 25716 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 2008.749910] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2008.751741] Call Trace: [ 2008.752328] dump_stack+0x107/0x167 [ 2008.753047] EXT4-fs (sda): Unrecognized mount option "test_dumm"_encryption" or missing value [ 2008.753141] should_fail.cold+0x5/0xa [ 2008.755678] should_failslab+0x5/0x20 [ 2008.756517] __kmalloc_track_caller+0x79/0x3c0 [ 2008.757514] ? trace_probe_init+0x227/0x4e0 [ 2008.758469] kstrdup+0x36/0x70 [ 2008.759192] trace_probe_init+0x227/0x4e0 [ 2008.760105] alloc_trace_kprobe+0x2ce/0x510 [ 2008.761050] ? __startup_64+0x7/0x3b0 [ 2008.761882] ? __startup_64+0x7/0x3b0 [ 2008.762718] ? __startup_64+0x7/0x3b0 [ 2008.763553] ? __startup_64+0x7/0x3b0 [ 2008.764383] create_local_trace_kprobe+0x4c/0x3b0 [ 2008.765446] perf_kprobe_init+0x18c/0x280 [ 2008.766383] perf_kprobe_event_init+0xf8/0x1c0 [ 2008.767412] perf_try_init_event+0x130/0x570 [ 2008.768390] perf_event_alloc.part.0+0xd96/0x2b30 [ 2008.769466] __do_sys_perf_event_open+0x580/0x2cb0 [ 2008.770558] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2008.771634] ? perf_event_set_output+0x5b0/0x5b0 [ 2008.772677] ? wait_for_completion_io+0x270/0x270 [ 2008.773744] ? __startup_64+0x7/0x3b0 [ 2008.774611] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2008.775164] FAULT_INJECTION: forcing a failure. [ 2008.775164] name failslab, interval 1, probability 0, space 0, times 0 [ 2008.775773] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2008.775802] do_syscall_64+0x33/0x40 [ 2008.775825] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2008.775852] RIP: 0033:0x7fb9acc68b19 [ 2008.782047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2008.786109] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2008.787818] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 2008.789385] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 2008.790951] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2008.792528] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2008.794096] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 [ 2008.795750] CPU: 0 PID: 25708 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2008.795863] trace_kprobe: Failed to allocate trace_probe.(-12) [ 2008.797147] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2008.797156] Call Trace: [ 2008.797187] dump_stack+0x107/0x167 [ 2008.797215] should_fail.cold+0x5/0xa [ 2008.802122] ? create_object.isra.0+0x3a/0xa20 [ 2008.803044] should_failslab+0x5/0x20 [ 2008.803825] kmem_cache_alloc+0x5b/0x360 [ 2008.804654] create_object.isra.0+0x3a/0xa20 [ 2008.805540] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2008.806565] kmem_cache_alloc+0x159/0x360 [ 2008.807410] mb_cache_entry_create+0xbf/0x910 [ 2008.808311] ? ext4_xattr_check_entries+0x337/0x3c0 [ 2008.809316] ext4_xattr_get+0x563/0xa00 [ 2008.810126] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 2008.811074] ? xattr_resolve_name+0x26e/0x3e0 [ 2008.811989] ? ext4_xattr_security_set+0x40/0x40 [ 2008.812927] __vfs_getxattr+0xe3/0x150 [ 2008.813708] ? __vfs_setxattr+0x180/0x180 [ 2008.814540] ? lock_acquire+0x197/0x490 [ 2008.815343] ? ext4_file_write_iter+0x377/0x18e0 [ 2008.816303] cap_inode_need_killpriv+0x3c/0x60 [ 2008.817388] security_inode_need_killpriv+0x46/0xa0 [ 2008.818576] file_remove_privs+0x30f/0x540 [ 2008.819492] ? init_once+0x230/0x230 [ 2008.820453] ? generic_write_checks+0x2ad/0x390 [ 2008.821450] ? generic_write_check_limits+0x2a0/0x2a0 [ 2008.822760] ? down_write+0xe0/0x160 [ 2008.823585] ? down_write_killable+0x180/0x180 [ 2008.824776] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2008.825909] file_modified+0x14/0xa0 [ 2008.826868] ext4_file_write_iter+0x906/0x18e0 [ 2008.827886] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2008.829007] ? __lockdep_reset_lock+0x180/0x180 [ 2008.829947] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2008.831221] ? SOFTIRQ_verbose+0x10/0x10 [ 2008.832060] new_sync_write+0x42c/0x660 [ 2008.833018] ? new_sync_read+0x6f0/0x6f0 [ 2008.833843] ? ksys_write+0x12d/0x260 [ 2008.834765] ? lock_release+0x6b0/0x6b0 [ 2008.835596] ? selinux_file_permission+0x36/0x510 [ 2008.836765] ? __fget_files+0x296/0x480 [ 2008.837588] vfs_write+0x747/0xa30 [ 2008.838460] ksys_write+0x12d/0x260 [ 2008.839214] ? __ia32_sys_read+0xb0/0xb0 [ 2008.840200] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2008.841262] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2008.842511] do_syscall_64+0x33/0x40 [ 2008.843288] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2008.844433] RIP: 0033:0x7f06a9247b19 [ 2008.845187] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2008.848865] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2008.850388] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2008.851821] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2008.853239] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2008.854668] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2008.856104] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 [ 2008.874869] EXT4-fs (sda): Unrecognized mount option "test_dumm"_encryption" or missing value 03:24:05 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:24:05 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 11) 03:24:06 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:24:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dumm%_encryption']) 03:24:06 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf903000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:24:06 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r0, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) mount$9p_fd(0x20000000, &(0x7f0000001080)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="7462616e733d66642c01666455f83feaacd0457345a326a47cdbafbcdd83ca60b7f7be8b02be953db8302b23e13edc0fe9853f2a5e69c650d1caae7693919d5624ea921d32a72979bc6e3c00", @ANYRESHEX=r0]) [ 2009.042560] FAULT_INJECTION: forcing a failure. [ 2009.042560] name failslab, interval 1, probability 0, space 0, times 0 [ 2009.044837] CPU: 0 PID: 25922 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 2009.046207] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2009.047855] Call Trace: [ 2009.048388] dump_stack+0x107/0x167 [ 2009.049118] should_fail.cold+0x5/0xa [ 2009.049878] ? create_object.isra.0+0x3a/0xa20 [ 2009.050787] should_failslab+0x5/0x20 [ 2009.051556] kmem_cache_alloc+0x5b/0x360 [ 2009.052363] ? lock_downgrade+0x6d0/0x6d0 [ 2009.053196] create_object.isra.0+0x3a/0xa20 [ 2009.054071] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2009.055106] __kmalloc_track_caller+0x177/0x3c0 [ 2009.056035] ? trace_probe_init+0x227/0x4e0 [ 2009.056906] kstrdup+0x36/0x70 [ 2009.057551] trace_probe_init+0x227/0x4e0 [ 2009.058382] alloc_trace_kprobe+0x2ce/0x510 [ 2009.059248] ? __startup_64+0x7/0x3b0 [ 2009.060004] ? __startup_64+0x7/0x3b0 [ 2009.060765] ? __startup_64+0x7/0x3b0 [ 2009.061517] ? __startup_64+0x7/0x3b0 [ 2009.062283] create_local_trace_kprobe+0x4c/0x3b0 [ 2009.063263] perf_kprobe_init+0x18c/0x280 [ 2009.064095] perf_kprobe_event_init+0xf8/0x1c0 [ 2009.065005] perf_try_init_event+0x130/0x570 [ 2009.065887] perf_event_alloc.part.0+0xd96/0x2b30 [ 2009.066858] __do_sys_perf_event_open+0x580/0x2cb0 [ 2009.067868] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2009.068839] ? perf_event_set_output+0x5b0/0x5b0 [ 2009.069781] ? wait_for_completion_io+0x270/0x270 [ 2009.070747] ? __startup_64+0x7/0x3b0 [ 2009.071531] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2009.072581] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2009.073612] do_syscall_64+0x33/0x40 [ 2009.074355] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2009.075390] RIP: 0033:0x7fb9acc68b19 [ 2009.076136] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2009.079779] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2009.081285] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 2009.082697] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 2009.084117] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2009.085442] EXT4-fs (sda): Unrecognized mount option "test_dumm%_encryption" or missing value [ 2009.085528] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2009.085551] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 [ 2009.120257] EXT4-fs (sda): Unrecognized mount option "test_dumm%_encryption" or missing value [ 2009.120637] 9pnet_virtio: no channels available for device 9p 03:24:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:24:22 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rf,no=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:24:22 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 3) 03:24:22 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:24:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dumm,_encryption']) 03:24:22 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 12) 03:24:22 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) r1 = openat2(r0, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={0x5000, 0x168, 0x1}, 0x18) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = getpid() syz_io_uring_setup(0x1d, &(0x7f0000000000), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000080)=0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000300)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r5}, 0x0) perf_event_open(&(0x7f0000001600)={0x0, 0x80, 0x3, 0x5, 0xf8, 0x7, 0x0, 0x1, 0x8, 0xa, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f00000015c0), 0x8}, 0x2602, 0xfffffffffffffffe, 0x0, 0x6, 0x4, 0x6, 0x7, 0x0, 0x7, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_io_uring_submit(0x0, r4, &(0x7f0000001140)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, r0, &(0x7f0000001080)=0x80, &(0x7f00000010c0)=@l2tp6={0xa, 0x0, 0x0, @empty}, 0x0, 0x40000, 0x1}, 0x7fffffff) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000001200)={'syztnl0\x00', &(0x7f0000001180)={'sit0\x00', 0x0, 0x29, 0x80, 0x40, 0x10000, 0x40, @remote, @private1, 0x80, 0x1, 0x6, 0x2}}) sendmsg$sock(r1, &(0x7f0000001580)={&(0x7f0000001240)=@xdp={0x2c, 0x8, r6, 0x17}, 0x80, &(0x7f0000001540)=[{&(0x7f00000012c0)="3c3965f62690c855b017bdb6bf05ce8b2c9da3c068cee74f7c412bc198d55a614685f1eac259f6f4afc00bbd35e5", 0x2e}, {&(0x7f0000001300)="b86c264d5d723b45b68e3b81ba98c7f1ae68b56861d5e2e8", 0x18}, {&(0x7f0000001340)="5205e1ca975bc94807fe32851e78e02f03cdccba367eab5a24db6db00a139c4eb10bd6223576bd050bf124764a04df8092515692e068e1f062ea5b9657531d6eaed6a278319d64d957d2e5179a708a12466804d5e6db8c4629835afaaebcf0e8ee68947f92a1187311bc069faf3fc7d80aafc4b34447bc9cf4c8f6c8969c8da25d6a5d07bc1892dfd382bd4d89e9e40dc059aca3df0d9dd6cc9a866e290b087703b99835bf07d2edc2a882331de64b933075f5c1646e616719506f6545c9d9ac40d23c9cf1943be4bcb8a4655c79096d293681c35da93c97bf85e759a8a28fae9fcc3815b5df4468a7316770", 0xec}, {&(0x7f0000001440)="d8ef45387f50a5cca9d3efcaf65a096c2ffb1d6bd8084a3ac9a199c9f92cbaf782ab00a5bb174037cd28728f25426c046a77982fadb1f9af5ef98e6fd13dce54eaa274ff1269754eee63dfb508d4756fb34a4f074108289e350f24287f5bd11bd0c22e4274975d8db651717e348a04f883d4adaed8df80169e7e32e4f11e8ac736ee92bc3e2a50f2c2a740934af359ccac8d19f718583bf9c6f088da33670c67f134180037613dfeac5ba656cbdb0fd10a4ef67ddcc91b8725edc29c6a699c322fb9bdd6c3af7b425158d5935bca0d0a202641ccddf283e17b7c38882148a62a572d", 0xe2}], 0x4}, 0x40000) prlimit64(r2, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r7, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x94, 0xe1, 0xb1, 0x6, 0x0, 0x6, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x2, @perf_config_ext={0x4, 0x9}, 0x4, 0x1, 0x3, 0x4, 0x8, 0x4, 0x1, 0x0, 0x600, 0x0, 0x7}, r2, 0x3, r7, 0x2) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:24:22 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xf903, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2025.616207] EXT4-fs (sda): Unrecognized mount option "test_dumm" or missing value 03:24:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2025.622809] 9pnet: Insufficient options for proto=fd [ 2025.625510] EXT4-fs (sda): Unrecognized mount option "test_dumm" or missing value [ 2025.634861] FAULT_INJECTION: forcing a failure. [ 2025.634861] name failslab, interval 1, probability 0, space 0, times 0 [ 2025.636722] CPU: 0 PID: 26043 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2025.637446] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2025.638292] Call Trace: [ 2025.638578] dump_stack+0x107/0x167 [ 2025.638960] should_fail.cold+0x5/0xa [ 2025.639358] ? mb_cache_entry_create+0xbf/0x910 [ 2025.639840] should_failslab+0x5/0x20 [ 2025.640121] FAULT_INJECTION: forcing a failure. [ 2025.640121] name failslab, interval 1, probability 0, space 0, times 0 [ 2025.640230] kmem_cache_alloc+0x5b/0x360 [ 2025.640247] mb_cache_entry_create+0xbf/0x910 [ 2025.643455] ext4_xattr_get+0x563/0xa00 [ 2025.643873] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 2025.644354] ? xattr_resolve_name+0x26e/0x3e0 [ 2025.644825] ? ext4_xattr_security_set+0x40/0x40 [ 2025.645336] __vfs_getxattr+0xe3/0x150 [ 2025.645756] ? __vfs_setxattr+0x180/0x180 [ 2025.646208] ? igrab+0xc0/0xc0 [ 2025.646560] ? ext4_xattr_security_set+0x40/0x40 [ 2025.647075] cap_inode_need_killpriv+0x3c/0x60 [ 2025.647577] security_inode_need_killpriv+0x46/0xa0 [ 2025.648119] notify_change+0x886/0x1080 [ 2025.648566] file_remove_privs+0x386/0x540 [ 2025.649021] ? init_once+0x230/0x230 [ 2025.649431] ? generic_write_checks+0x2ad/0x390 [ 2025.649946] ? down_write+0xe0/0x160 [ 2025.650348] ? down_write_killable+0x180/0x180 [ 2025.650849] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2025.651424] file_modified+0x14/0xa0 [ 2025.651829] ext4_file_write_iter+0x906/0x18e0 [ 2025.652344] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2025.652834] ? __lockdep_reset_lock+0x180/0x180 [ 2025.653338] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2025.653905] ? SOFTIRQ_verbose+0x10/0x10 [ 2025.654345] new_sync_write+0x42c/0x660 [ 2025.654777] ? new_sync_read+0x6f0/0x6f0 [ 2025.655220] ? ksys_write+0x12d/0x260 [ 2025.655638] ? lock_release+0x6b0/0x6b0 [ 2025.656080] ? selinux_file_permission+0x36/0x510 [ 2025.656611] ? __fget_files+0x296/0x480 [ 2025.657051] vfs_write+0x747/0xa30 [ 2025.657442] ksys_write+0x12d/0x260 [ 2025.657831] ? __ia32_sys_read+0xb0/0xb0 [ 2025.658279] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2025.658851] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2025.659432] do_syscall_64+0x33/0x40 [ 2025.659833] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2025.660391] RIP: 0033:0x7f06a9247b19 [ 2025.660796] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2025.662790] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2025.663646] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2025.664401] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2025.665173] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2025.665947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2025.666710] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 [ 2025.667525] CPU: 1 PID: 26065 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 2025.669013] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2025.670777] Call Trace: [ 2025.671359] dump_stack+0x107/0x167 [ 2025.672140] should_fail.cold+0x5/0xa [ 2025.672960] should_failslab+0x5/0x20 [ 2025.673769] __kmalloc_track_caller+0x79/0x3c0 [ 2025.674739] ? trace_probe_init+0x284/0x4e0 [ 2025.675677] kstrdup+0x36/0x70 [ 2025.676368] trace_probe_init+0x284/0x4e0 [ 2025.677255] alloc_trace_kprobe+0x2ce/0x510 [ 2025.678173] ? __startup_64+0x7/0x3b0 [ 2025.678980] ? __startup_64+0x7/0x3b0 [ 2025.679803] ? __startup_64+0x7/0x3b0 [ 2025.680610] ? __startup_64+0x7/0x3b0 [ 2025.681420] create_local_trace_kprobe+0x4c/0x3b0 [ 2025.682452] perf_kprobe_init+0x18c/0x280 [ 2025.683361] perf_kprobe_event_init+0xf8/0x1c0 [ 2025.684338] perf_try_init_event+0x130/0x570 [ 2025.685288] perf_event_alloc.part.0+0xd96/0x2b30 [ 2025.686335] __do_sys_perf_event_open+0x580/0x2cb0 [ 2025.687402] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2025.688436] ? perf_event_set_output+0x5b0/0x5b0 [ 2025.689442] ? wait_for_completion_io+0x270/0x270 [ 2025.690478] ? __startup_64+0x7/0x3b0 [ 2025.691322] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2025.692440] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2025.693546] do_syscall_64+0x33/0x40 [ 2025.694343] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2025.695435] RIP: 0033:0x7fb9acc68b19 [ 2025.696230] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2025.700126] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2025.702111] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 2025.703657] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 2025.705181] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2025.707028] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2025.708562] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 [ 2025.710401] trace_kprobe: Failed to allocate trace_probe.(-12) [ 2025.732310] 9pnet: Insufficient options for proto=fd 03:24:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy\nencryption']) 03:24:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1e01000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:24:22 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) r1 = accept4$inet6(r0, 0x0, &(0x7f0000000080), 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x400, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000280)) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="4019428d61eadf3225059c56610d7d145984479d5bc729871db93fe968c39aeb64e63925aac94a86539819352300c2fb07180447e41442c8b91b20a415014c905449a2e8d691c38a17013018b0ab8ce1dc5982ce8e848c93ea8ed9f01d3c55c5e3fa4cb8cb1ba6cbddca4e11a6384d167d8ef581bcc278a1c44c094e6848e275e12559a1f2039f228ef86493ec04aef408c6fe1624de26062086ea7135c0112adf3de41a8935f731ecbd9b22b4283139972e078338c0096eccc77b3e96af66d2396747414f10553e624a7ff83b77c63d58db9e8486787a275b7d4e2eeda63b8f5331f596a261288f9bc2a5f9ae5a147ccd54bad5", 0xf4}], 0x1) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {0xfffffffc}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="7472616e73ee0736b87266649aed083de87b9552c02583686badf71bce6878e7ae55770a8ba31f60da3274207bcf08e588bd967e6f8b16cb76052b91ac0ddabb20432b3980a060df33cb9d3d696e7a5e0f1a062fce0743a9390ab1d6ab957f4e19debc20bc58a57bed41d71d6703d6b9dd69d48a53bd8624ae0526b3001f6f3b7fd9cb7a02a3543c450a4a288f627c68c7fd7548f535e9f6c6222bace5cef4e0e38d39dbd5ed9173b3558b68ba578a9694a1a9689d673f742fc6034c4c1e75105e1da6682b25c77ca0c3c1db4ad2105a04b4bd4838fb087a8756", @ANYRESHEX]) [ 2025.780232] EXT4-fs (sda): Unrecognized mount option "test_dummy [ 2025.780232] encryption" or missing value [ 2025.790280] EXT4-fs (sda): Unrecognized mount option "test_dummy [ 2025.790280] encryption" or missing value [ 2025.801729] 9pnet_virtio: no channels available for device 9p 03:24:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:24:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfIno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:24:39 executing program 6: prctl$PR_SET_THP_DISABLE(0x29, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x193080, 0x103) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="f472616e733d665d640b0a9a2f9750da9ef800a0a382375b75d742cd20e2c84d1ddccc4e4635fc08c206b58f643d4bf8c74e1cc024263bc388c3b27ec6ae173771732b395a6f6abf7eb1bbcec4e642415e5ec766ffb9b50e732a80a53e4dff20b804ff7496f6a5d38accc6b9e548e6892195d25888e73746e3817785b2911e404b8f507ef326973b2b54141085af4525c932a836d5d2b6c19c75437f7ef571", @ANYRESHEX]) 03:24:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:24:39 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy\"encryption']) 03:24:39 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:24:39 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 13) 03:24:39 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 4) [ 2042.681289] FAULT_INJECTION: forcing a failure. [ 2042.681289] name failslab, interval 1, probability 0, space 0, times 0 [ 2042.683863] CPU: 0 PID: 26385 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 2042.684883] EXT4-fs (sda): Unrecognized mount option "test_dummy"encryption" or missing value [ 2042.685251] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2042.685259] Call Trace: [ 2042.685288] dump_stack+0x107/0x167 [ 2042.685315] should_fail.cold+0x5/0xa [ 2042.690165] ? create_object.isra.0+0x3a/0xa20 [ 2042.691092] should_failslab+0x5/0x20 [ 2042.691870] kmem_cache_alloc+0x5b/0x360 [ 2042.692704] create_object.isra.0+0x3a/0xa20 [ 2042.693590] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2042.694621] __kmalloc_track_caller+0x177/0x3c0 [ 2042.695586] ? trace_probe_init+0x284/0x4e0 [ 2042.696473] kstrdup+0x36/0x70 [ 2042.697129] trace_probe_init+0x284/0x4e0 [ 2042.697976] alloc_trace_kprobe+0x2ce/0x510 [ 2042.698845] ? __startup_64+0x7/0x3b0 [ 2042.699620] ? __startup_64+0x7/0x3b0 [ 2042.700394] ? __startup_64+0x7/0x3b0 [ 2042.701160] ? __startup_64+0x7/0x3b0 [ 2042.701928] create_local_trace_kprobe+0x4c/0x3b0 [ 2042.702911] perf_kprobe_init+0x18c/0x280 [ 2042.703780] perf_kprobe_event_init+0xf8/0x1c0 [ 2042.704711] perf_try_init_event+0x130/0x570 [ 2042.705613] perf_event_alloc.part.0+0xd96/0x2b30 [ 2042.706605] __do_sys_perf_event_open+0x580/0x2cb0 [ 2042.707619] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2042.708593] ? perf_event_set_output+0x5b0/0x5b0 [ 2042.709547] ? wait_for_completion_io+0x270/0x270 [ 2042.710535] ? __startup_64+0x7/0x3b0 [ 2042.711323] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2042.712392] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2042.713469] do_syscall_64+0x33/0x40 [ 2042.714228] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2042.715262] RIP: 0033:0x7fb9acc68b19 [ 2042.716038] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2042.719746] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2042.721284] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 2042.722725] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 2042.724168] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2042.725606] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2042.727047] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 [ 2042.732529] EXT4-fs (sda): Unrecognized mount option "test_dummy"encryption" or missing value [ 2042.751627] 9pnet: Insufficient options for proto=fd [ 2042.757334] 9pnet_virtio: no channels available for device 9p 03:24:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:24:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2042.822932] FAULT_INJECTION: forcing a failure. [ 2042.822932] name failslab, interval 1, probability 0, space 0, times 0 [ 2042.828245] CPU: 0 PID: 26393 Comm: syz-executor.5 Not tainted 5.10.165 #1 03:24:39 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy%encryption']) [ 2042.829881] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2042.831986] Call Trace: [ 2042.832621] dump_stack+0x107/0x167 [ 2042.833492] should_fail.cold+0x5/0xa [ 2042.834401] ? create_object.isra.0+0x3a/0xa20 [ 2042.835486] should_failslab+0x5/0x20 [ 2042.836410] kmem_cache_alloc+0x5b/0x360 [ 2042.837397] create_object.isra.0+0x3a/0xa20 [ 2042.838436] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2042.839648] kmem_cache_alloc+0x159/0x360 [ 2042.840644] mb_cache_entry_create+0xbf/0x910 [ 2042.841720] ext4_xattr_get+0x563/0xa00 [ 2042.842674] ? ext4_xattr_ibody_get+0x4a0/0x4a0 [ 2042.843816] ? xattr_resolve_name+0x26e/0x3e0 [ 2042.844891] ? ext4_xattr_security_set+0x40/0x40 [ 2042.846003] __vfs_getxattr+0xe3/0x150 [ 2042.846920] ? __vfs_setxattr+0x180/0x180 [ 2042.847917] ? igrab+0xc0/0xc0 [ 2042.848677] ? ext4_xattr_security_set+0x40/0x40 [ 2042.849808] cap_inode_need_killpriv+0x3c/0x60 [ 2042.850890] security_inode_need_killpriv+0x46/0xa0 [ 2042.852084] notify_change+0x886/0x1080 [ 2042.853045] file_remove_privs+0x386/0x540 [ 2042.854051] ? init_once+0x230/0x230 [ 2042.854941] ? generic_write_checks+0x2ad/0x390 [ 2042.856063] ? down_write+0xe0/0x160 [ 2042.856946] ? down_write_killable+0x180/0x180 [ 2042.858026] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2042.859263] file_modified+0x14/0xa0 [ 2042.860160] ext4_file_write_iter+0x906/0x18e0 [ 2042.861252] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2042.862316] ? __lockdep_reset_lock+0x180/0x180 [ 2042.863407] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2042.864633] ? SOFTIRQ_verbose+0x10/0x10 [ 2042.865595] new_sync_write+0x42c/0x660 [ 2042.866528] ? new_sync_read+0x6f0/0x6f0 [ 2042.867479] ? ksys_write+0x12d/0x260 [ 2042.868386] ? lock_release+0x6b0/0x6b0 [ 2042.869319] ? selinux_file_permission+0x36/0x510 [ 2042.870456] ? __fget_files+0x296/0x480 [ 2042.870960] EXT4-fs (sda): Unrecognized mount option "test_dummy%encryption" or missing value [ 2042.871405] vfs_write+0x747/0xa30 [ 2042.873308] ksys_write+0x12d/0x260 [ 2042.874169] ? __ia32_sys_read+0xb0/0xb0 [ 2042.875129] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2042.876368] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2042.877588] do_syscall_64+0x33/0x40 [ 2042.878467] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2042.879671] RIP: 0033:0x7f06a9247b19 [ 2042.880554] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2042.884868] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2042.886644] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2042.888315] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2042.889985] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2042.891658] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2042.893337] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 [ 2042.912263] EXT4-fs (sda): Unrecognized mount option "test_dummy%encryption" or missing value 03:24:39 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80ffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:24:55 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 14) 03:24:55 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 5) 03:24:55 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:24:55 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:24:55 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy,encryption']) 03:24:55 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:24:55 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r0, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) r1 = clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {0x200}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) fsetxattr$security_capability(r2, &(0x7f0000000080), &(0x7f00000000c0)=@v1={0x1000000, [{0x3, 0x2}]}, 0xc, 0x1) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000080)={r5, 0x1, 0x6, @dev}, 0x10) sendmmsg$inet6(r0, &(0x7f0000002900)=[{{&(0x7f0000001080)={0xa, 0x4e23, 0x84b, @remote, 0x9}, 0x1c, &(0x7f0000001200)=[{&(0x7f00000010c0)="39f1dc2852f18d8a715286cc58adb7617a866daeffb5c62c3ca34309a4bdc8222e56", 0x22}, {&(0x7f0000001100)="68a808768b2ef062e9e4a81c5ecf1d96ae7f8e8383d146682f07ad4ea48c1881c2795b2ee6d531eff54e1417f67e0b97cf905ee2253a285b6a483cc30f807c044561fba290bc734adf3ed7bf996a15fd317c26e70a619f5e4c4ab0ba669b013262b95bf425c3735de0fab6b5c0abf07612df54b3721cb451a6911a8f2d848c03b2eecd84d4be9cec75a131e97085cc41e454e30a4d8bed19a726e3fb9f41e89935da6b988caec69b90b4920307a87cc4e4e24d0b2fe22adc63da69fd1fa0ec41a7f051b5a10fd4542a6446cd1bbb54a1a2f63df67ec81cbfcce20c2fd151e511919802d2b03710f80d6d0122e189c4f745bc", 0xf2}], 0x2, &(0x7f0000001240)=[@rthdr={{0x28, 0x29, 0x39, {0x88, 0x2, 0x2, 0x2, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}}}, @tclass={{0x14, 0x29, 0x43, 0x3f}}, @flowinfo={{0x14, 0x29, 0xb, 0x800}}, @rthdrdstopts={{0x58, 0x29, 0x37, {0x2f, 0x8, '\x00', [@ra={0x5, 0x2, 0xa37}, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @loopback}}, @enc_lim={0x4, 0x1, 0x9}, @hao={0xc9, 0x10, @mcast1}, @jumbo={0xc2, 0x4, 0x3}, @pad1]}}}, @flowinfo={{0x14, 0x29, 0xb, 0xffffffa6}}, @rthdr={{0x68, 0x29, 0x39, {0x6, 0xa, 0x1, 0x80, 0x0, [@loopback, @empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010100}]}}}, @dstopts_2292={{0x48, 0x29, 0x4, {0x84, 0x5, '\x00', [@ra={0x5, 0x2, 0x9}, @calipso={0x7, 0x20, {0x1, 0x6, 0x8, 0x4, [0x3, 0x100000000, 0x2]}}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x97000000}}], 0x190}}, {{&(0x7f0000001400)={0xa, 0x4e20, 0x490, @private1}, 0x1c, &(0x7f0000002440)=[{&(0x7f0000001440)="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", 0x1000}], 0x1}}, {{&(0x7f0000002480)={0xa, 0x4e20, 0x5, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0xfffffff8}, 0x1c, &(0x7f0000002740)=[{&(0x7f00000024c0)="3a1c0ce3b05f6ab2489dda721b9b7ec2789aee08d27f20031fa71cd3f6fd990d6e08bc59053af13cc8fd3c95cbf6c9c5dbcfa617b38dc2c85a13719f8541e1f17eae923f330aa72570c499da122fd69cae0cb6d3aa87e116726d7943495fa7f6a1fdfa66ae8dee204aed16877c6020888c501bc2df7229c32320789f34d408efee5c58565699bac8b085c2a4373bc040353708901b637fc117aa0ac61fd6591066b487f4b085304ef6874a74df79052b033c7f2789d80677fd", 0xb9}, {&(0x7f0000002580)="48a18ddb9012f2eade77030e38463a93a0864f83d7051de45fa7fc2e76b0b17b0a7e318435ca5b62093500747c816e99a1bf4da875949b6c8a7ba3f803f5e9c8bb3b2e05d92d3c8f103b4030d0917d640f18a13ba61c1205d41dc0a61bea7afad1c8ad808c0647a17c7f2ed6eec3b575a8afb59b28ab9ba102bf37572be00193e0e57175447054ef5e15ec4279dd298a51e96af7bd3b2755fa2fed2d2a12c4feb3aee4906e30a84898413f2d3f", 0xad}, {&(0x7f0000002640)="b7a895a5bcec505fc4964e5fd9bee53e22aeb8112f9f1becb56a3a8f9bf521879427ce94b9a106bd27789892768b19e7", 0x30}, {&(0x7f0000002680)="47c7c9e301dd9743537b152997e8b7397dc13d60a9b616f503", 0x19}, {&(0x7f00000026c0)="b1b455e40be36974bcf7ce9b5ce14566739c0b667de29aae4e27adcbc108987536888250698805c50c422ea137b0c225601d", 0x32}, {&(0x7f0000002700)="3ab267091a799fffd680bdbedfeb57c31d2408c7cb8f4f34d6df047672e2", 0x1e}], 0x6, &(0x7f00000027c0)=[@tclass={{0x14, 0x29, 0x43, 0x4}}, @tclass={{0x14, 0x29, 0x43, 0x78a}}, @pktinfo={{0x24, 0x29, 0x32, {@private1={0xfc, 0x1, '\x00', 0x1}}}}, @hopopts={{0x68, 0x29, 0x36, {0x33, 0x9, '\x00', [@calipso={0x7, 0x48, {0x2, 0x10, 0x5, 0x6, [0x1, 0x9, 0x1, 0x100000001, 0x3f, 0x9, 0x3, 0x5]}}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@local, r5}}}, @rthdrdstopts={{0x20, 0x29, 0x37, {0x89, 0x0, '\x00', [@ra={0x5, 0x2, 0xeeb2}]}}}, @dstopts={{0x28, 0x29, 0x37, {0x62, 0x1, '\x00', [@pad1, @jumbo={0xc2, 0x4, 0x8}]}}}], 0x130}}], 0x3, 0x20040044) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r6, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) setsockopt$inet6_udp_int(r6, 0x11, 0xa, &(0x7f0000000180)=0xfff, 0x4) r7 = getpid() prlimit64(r7, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) clone3(&(0x7f0000002b80)={0x32c816000, &(0x7f00000029c0), &(0x7f0000002a00), &(0x7f0000002a40), {0x10}, &(0x7f0000002a80)=""/125, 0x7d, &(0x7f0000002b00)=""/40, &(0x7f0000002b40)=[r1, r7], 0x2}, 0x58) 03:24:55 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfQno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 2058.086324] 9pnet: Insufficient options for proto=fd [ 2058.090052] 9pnet: Insufficient options for proto=fd [ 2058.095725] FAULT_INJECTION: forcing a failure. [ 2058.095725] name failslab, interval 1, probability 0, space 0, times 0 [ 2058.096512] EXT4-fs (sda): Unrecognized mount option "test_dummy" or missing value [ 2058.098270] CPU: 0 PID: 26627 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 2058.101325] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2058.101886] device lo entered promiscuous mode [ 2058.103160] Call Trace: [ 2058.103192] dump_stack+0x107/0x167 [ 2058.103220] should_fail.cold+0x5/0xa [ 2058.103248] ? traceprobe_set_print_fmt+0x5a/0xd0 [ 2058.103273] should_failslab+0x5/0x20 [ 2058.103292] __kmalloc+0x72/0x3f0 [ 2058.103326] traceprobe_set_print_fmt+0x5a/0xd0 [ 2058.103353] create_local_trace_kprobe+0x1ca/0x3b0 [ 2058.103381] perf_kprobe_init+0x18c/0x280 [ 2058.103411] perf_kprobe_event_init+0xf8/0x1c0 [ 2058.103436] perf_try_init_event+0x130/0x570 [ 2058.103466] perf_event_alloc.part.0+0xd96/0x2b30 [ 2058.103505] __do_sys_perf_event_open+0x580/0x2cb0 [ 2058.103541] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2058.103566] ? perf_event_set_output+0x5b0/0x5b0 [ 2058.103585] ? wait_for_completion_io+0x270/0x270 [ 2058.103620] ? __startup_64+0x7/0x3b0 [ 2058.103659] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2058.113741] device lo left promiscuous mode [ 2058.114309] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2058.114339] do_syscall_64+0x33/0x40 [ 2058.114368] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2058.125433] RIP: 0033:0x7fb9acc68b19 [ 2058.126253] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2058.130295] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2058.131975] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 2058.133551] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 2058.135156] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2058.136775] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2058.138383] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 [ 2058.152340] EXT4-fs (sda): Unrecognized mount option "test_dummy" or missing value 03:24:55 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf903000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:24:55 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2058.247067] FAULT_INJECTION: forcing a failure. [ 2058.247067] name failslab, interval 1, probability 0, space 0, times 0 [ 2058.250145] CPU: 0 PID: 26625 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2058.251633] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2058.253411] Call Trace: [ 2058.253981] dump_stack+0x107/0x167 [ 2058.254760] should_fail.cold+0x5/0xa [ 2058.255586] ? jbd2__journal_start+0x190/0x890 [ 2058.256557] should_failslab+0x5/0x20 [ 2058.257367] kmem_cache_alloc+0x5b/0x360 [ 2058.258217] ? down_write_nested+0x160/0x160 [ 2058.259177] jbd2__journal_start+0x190/0x890 [ 2058.260142] __ext4_journal_start_sb+0x214/0x430 [ 2058.261154] ext4_xattr_set+0x23a/0x340 [ 2058.262010] ? ext4_xattr_set_credits+0x200/0x200 [ 2058.263033] ? lock_chain_count+0x20/0x20 [ 2058.263935] ? xattr_resolve_name+0x26e/0x3e0 [ 2058.264888] ? ext4_initxattrs+0x120/0x120 [ 2058.265776] __vfs_removexattr+0xf9/0x170 [ 2058.266652] ? __vfs_getxattr+0x150/0x150 [ 2058.267549] cap_inode_killpriv+0x19/0x50 [ 2058.268431] security_inode_killpriv+0x46/0xa0 [ 2058.269399] setattr_prepare+0x19f/0x7e0 [ 2058.270277] ext4_setattr+0x1a8/0x22c0 [ 2058.271102] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2058.272265] ? ext4_journalled_write_end+0x1240/0x1240 [ 2058.273393] ? ext4_journalled_write_end+0x1240/0x1240 [ 2058.274497] notify_change+0xba2/0x1080 [ 2058.275339] file_remove_privs+0x386/0x540 [ 2058.276231] ? init_once+0x230/0x230 [ 2058.277021] ? generic_write_checks+0x2ad/0x390 [ 2058.278010] ? ext4_file_write_iter+0x42d/0x18e0 [ 2058.279004] file_modified+0x14/0xa0 [ 2058.279790] ext4_file_write_iter+0x906/0x18e0 [ 2058.280771] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2058.281736] ? new_sync_write+0xf6/0x660 [ 2058.282596] new_sync_write+0x42c/0x660 [ 2058.283434] ? new_sync_read+0x6f0/0x6f0 [ 2058.284310] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2058.285421] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2058.286595] vfs_write+0x747/0xa30 [ 2058.287359] ksys_write+0x12d/0x260 [ 2058.288134] ? __ia32_sys_read+0xb0/0xb0 [ 2058.288995] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2058.290101] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2058.291188] do_syscall_64+0x33/0x40 [ 2058.291988] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2058.293052] RIP: 0033:0x7f06a9247b19 [ 2058.293834] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2058.297669] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2058.299250] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2058.300748] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2058.302233] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2058.303731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2058.305590] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:24:55 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_\nncryption']) 03:24:55 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfRno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:24:55 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2058.380347] EXT4-fs (sda): Unrecognized mount option "test_dummy_ [ 2058.380347] ncryption" or missing value 03:24:55 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x80049367, &(0x7f0000000080)) [ 2058.396484] EXT4-fs (sda): Unrecognized mount option "test_dummy_ [ 2058.396484] ncryption" or missing value [ 2058.403237] 9pnet: Insufficient options for proto=fd 03:24:55 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:24:55 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 15) 03:24:55 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2058.489508] 9pnet: Insufficient options for proto=fd [ 2058.528148] FAULT_INJECTION: forcing a failure. [ 2058.528148] name failslab, interval 1, probability 0, space 0, times 0 [ 2058.530478] CPU: 0 PID: 26934 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 2058.531887] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2058.533540] Call Trace: [ 2058.534090] dump_stack+0x107/0x167 [ 2058.534835] should_fail.cold+0x5/0xa [ 2058.535614] ? create_object.isra.0+0x3a/0xa20 [ 2058.536568] should_failslab+0x5/0x20 [ 2058.537340] kmem_cache_alloc+0x5b/0x360 [ 2058.538163] create_object.isra.0+0x3a/0xa20 [ 2058.539059] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2058.540105] __kmalloc+0x16e/0x3f0 [ 2058.540840] traceprobe_set_print_fmt+0x5a/0xd0 [ 2058.541780] create_local_trace_kprobe+0x1ca/0x3b0 [ 2058.542771] perf_kprobe_init+0x18c/0x280 [ 2058.543615] perf_kprobe_event_init+0xf8/0x1c0 [ 2058.544547] perf_try_init_event+0x130/0x570 [ 2058.545441] perf_event_alloc.part.0+0xd96/0x2b30 [ 2058.546433] __do_sys_perf_event_open+0x580/0x2cb0 [ 2058.547430] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2058.548418] ? perf_event_set_output+0x5b0/0x5b0 [ 2058.549366] ? wait_for_completion_io+0x270/0x270 [ 2058.550346] ? __startup_64+0x7/0x3b0 [ 2058.551127] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2058.552190] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2058.553232] do_syscall_64+0x33/0x40 [ 2058.553985] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2058.555011] RIP: 0033:0x7fb9acc68b19 [ 2058.555776] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2058.559456] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2058.560999] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 2058.562431] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 2058.563870] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2058.565300] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2058.566751] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 03:25:11 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:25:11 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_\"ncryption']) 03:25:11 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfSno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:25:11 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 16) 03:25:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000000), 0x0) clone3(&(0x7f0000000380)={0x124000400, &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280), {0x2f}, &(0x7f00000002c0)=""/89, 0x59, &(0x7f0000000940)=""/4096, &(0x7f0000000340)=[r2, 0xffffffffffffffff], 0x2, {r0}}, 0x58) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000400)=0x0) prctl$PR_SCHED_CORE(0x3e, 0x3, r3, 0x2, &(0x7f0000000440)) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}, 0x5}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) fcntl$dupfd(r0, 0x0, r1) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='\trans=fd,rfd', @ANYRESHEX]) truncate(&(0x7f0000000180)='./file1\x00', 0x8001) creat(&(0x7f0000000080)='./file1\x00', 0x20) 03:25:11 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 6) 03:25:11 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:25:11 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2074.759444] 9pnet: Insufficient options for proto=fd [ 2074.778207] FAULT_INJECTION: forcing a failure. [ 2074.778207] name failslab, interval 1, probability 0, space 0, times 0 [ 2074.780874] CPU: 1 PID: 27079 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 2074.782459] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2074.784372] Call Trace: [ 2074.784989] dump_stack+0x107/0x167 [ 2074.785832] should_fail.cold+0x5/0xa [ 2074.786710] ? alloc_aggr_kprobe+0x41/0x190 [ 2074.787699] should_failslab+0x5/0x20 [ 2074.788580] kmem_cache_alloc_trace+0x55/0x360 [ 2074.789636] alloc_aggr_kprobe+0x41/0x190 [ 2074.790586] register_kprobe+0xbfa/0x13d0 [ 2074.791528] ? __startup_64+0x7/0x3b0 [ 2074.792419] __register_trace_kprobe+0x26a/0x2d0 [ 2074.793507] create_local_trace_kprobe+0x1e6/0x3b0 [ 2074.794638] perf_kprobe_init+0x18c/0x280 [ 2074.795598] perf_kprobe_event_init+0xf8/0x1c0 [ 2074.796664] perf_try_init_event+0x130/0x570 [ 2074.797686] perf_event_alloc.part.0+0xd96/0x2b30 [ 2074.798807] __do_sys_perf_event_open+0x580/0x2cb0 [ 2074.799952] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2074.801065] ? perf_event_set_output+0x5b0/0x5b0 [ 2074.802141] ? wait_for_completion_io+0x270/0x270 [ 2074.803264] ? __startup_64+0x7/0x3b0 [ 2074.804163] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2074.805363] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2074.806550] do_syscall_64+0x33/0x40 [ 2074.807406] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2074.808590] RIP: 0033:0x7fb9acc68b19 [ 2074.809446] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2074.813630] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2074.815371] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 2074.817015] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 2074.818639] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2074.820272] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2074.821899] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 [ 2074.833129] EXT4-fs (sda): Unrecognized mount option "test_dummy_"ncryption" or missing value [ 2074.849585] EXT4-fs (sda): Unrecognized mount option "test_dummy_"ncryption" or missing value 03:25:11 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:25:11 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2074.882499] FAULT_INJECTION: forcing a failure. [ 2074.882499] name failslab, interval 1, probability 0, space 0, times 0 [ 2074.885301] CPU: 1 PID: 27078 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2074.886888] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2074.888799] Call Trace: [ 2074.889416] dump_stack+0x107/0x167 [ 2074.890258] should_fail.cold+0x5/0xa [ 2074.891135] ? create_object.isra.0+0x3a/0xa20 [ 2074.892193] should_failslab+0x5/0x20 [ 2074.893070] kmem_cache_alloc+0x5b/0x360 [ 2074.894012] create_object.isra.0+0x3a/0xa20 [ 2074.895041] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2074.896230] kmem_cache_alloc+0x159/0x360 [ 2074.897177] ? down_write_nested+0x160/0x160 [ 2074.898196] jbd2__journal_start+0x190/0x890 [ 2074.899216] __ext4_journal_start_sb+0x214/0x430 [ 2074.900315] ext4_xattr_set+0x23a/0x340 [ 2074.901245] ? ext4_xattr_set_credits+0x200/0x200 [ 2074.902348] ? finish_task_switch+0x126/0x5d0 [ 2074.903380] ? finish_task_switch+0xef/0x5d0 [ 2074.904387] ? __switch_to+0x572/0xff0 [ 2074.905279] ? __switch_to_asm+0x34/0x60 [ 2074.906211] ? xattr_resolve_name+0x26e/0x3e0 [ 2074.907246] ? ext4_initxattrs+0x120/0x120 [ 2074.908227] __vfs_removexattr+0xf9/0x170 [ 2074.909180] ? __vfs_getxattr+0x150/0x150 [ 2074.910150] cap_inode_killpriv+0x19/0x50 [ 2074.911101] security_inode_killpriv+0x46/0xa0 [ 2074.912147] setattr_prepare+0x19f/0x7e0 [ 2074.913085] ext4_setattr+0x1a8/0x22c0 [ 2074.913973] ? igrab+0xc0/0xc0 [ 2074.914704] ? ext4_xattr_security_set+0x40/0x40 [ 2074.915792] ? ext4_journalled_write_end+0x1240/0x1240 [ 2074.917030] notify_change+0xba2/0x1080 [ 2074.917961] file_remove_privs+0x386/0x540 [ 2074.918921] ? init_once+0x230/0x230 [ 2074.919772] ? generic_write_checks+0x2ad/0x390 [ 2074.920853] ? ext4_inode_journal_mode+0x12/0x4f0 [ 2074.921950] file_modified+0x14/0xa0 [ 2074.922797] ext4_file_write_iter+0x906/0x18e0 [ 2074.923852] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2074.924892] ? __lockdep_reset_lock+0x180/0x180 [ 2074.925950] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2074.927131] ? SOFTIRQ_verbose+0x10/0x10 [ 2074.928080] new_sync_write+0x42c/0x660 [ 2074.928990] ? new_sync_read+0x6f0/0x6f0 [ 2074.929909] ? ksys_write+0x12d/0x260 [ 2074.930776] ? lock_release+0x6b0/0x6b0 [ 2074.931679] ? selinux_file_permission+0x36/0x510 [ 2074.932786] ? __fget_files+0x296/0x480 [ 2074.933706] vfs_write+0x747/0xa30 [ 2074.934523] ksys_write+0x12d/0x260 [ 2074.935350] ? __ia32_sys_read+0xb0/0xb0 [ 2074.936291] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2074.937482] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2074.938673] do_syscall_64+0x33/0x40 [ 2074.939522] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2074.940686] RIP: 0033:0x7f06a9247b19 [ 2074.941537] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2074.945685] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2074.947426] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2074.949057] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2074.950671] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2074.952292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2074.953902] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:25:12 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfTno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:25:12 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_%ncryption']) [ 2075.047854] 9pnet: Insufficient options for proto=fd 03:25:12 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 17) 03:25:12 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:25:12 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:25:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) r1 = getpid() prlimit64(r1, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) clone3(&(0x7f0000000300)={0x48803c00, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0x22}, &(0x7f0000000180)=""/120, 0x78, &(0x7f0000000240)=""/114, &(0x7f00000002c0)=[r1], 0x1, {r0}}, 0x58) [ 2075.099082] EXT4-fs (sda): Unrecognized mount option "test_dummy_%ncryption" or missing value [ 2075.133288] EXT4-fs (sda): Unrecognized mount option "test_dummy_%ncryption" or missing value 03:25:12 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2075.149816] FAULT_INJECTION: forcing a failure. [ 2075.149816] name failslab, interval 1, probability 0, space 0, times 0 [ 2075.152256] CPU: 0 PID: 27275 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 2075.152764] 9pnet: Insufficient options for proto=fd [ 2075.153630] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2075.153637] Call Trace: [ 2075.153662] dump_stack+0x107/0x167 [ 2075.153688] should_fail.cold+0x5/0xa [ 2075.153716] ? create_object.isra.0+0x3a/0xa20 [ 2075.159337] should_failslab+0x5/0x20 [ 2075.160092] kmem_cache_alloc+0x5b/0x360 [ 2075.160894] ? mutex_lock_io_nested+0x1110/0x1110 [ 2075.161852] create_object.isra.0+0x3a/0xa20 [ 2075.162717] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2075.163724] kmem_cache_alloc_trace+0x151/0x360 [ 2075.164658] alloc_aggr_kprobe+0x41/0x190 [ 2075.165481] register_kprobe+0xbfa/0x13d0 [ 2075.166287] ? __startup_64+0x7/0x3b0 [ 2075.167049] __register_trace_kprobe+0x26a/0x2d0 [ 2075.168032] create_local_trace_kprobe+0x1e6/0x3b0 [ 2075.169006] perf_kprobe_init+0x18c/0x280 [ 2075.169837] perf_kprobe_event_init+0xf8/0x1c0 [ 2075.170737] perf_try_init_event+0x130/0x570 [ 2075.171627] perf_event_alloc.part.0+0xd96/0x2b30 [ 2075.172602] __do_sys_perf_event_open+0x580/0x2cb0 [ 2075.173578] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2075.174529] ? perf_event_set_output+0x5b0/0x5b0 [ 2075.175457] ? wait_for_completion_io+0x270/0x270 [ 2075.176432] ? __startup_64+0x7/0x3b0 [ 2075.177199] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2075.178230] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2075.179245] do_syscall_64+0x33/0x40 [ 2075.179988] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2075.180993] RIP: 0033:0x7fb9acc68b19 [ 2075.181733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2075.185326] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2075.186804] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 2075.188198] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 2075.189581] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2075.190962] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2075.192352] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 03:25:12 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:25:12 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_,ncryption']) [ 2075.380528] EXT4-fs (sda): Unrecognized mount option "test_dummy_" or missing value [ 2075.388120] EXT4-fs (sda): Unrecognized mount option "test_dummy_" or missing value 03:25:29 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfVno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:25:29 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 7) 03:25:29 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_e\ncryption']) 03:25:29 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r0, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) openat(0xffffffffffffff9c, &(0x7f0000001080)='./file1\x00', 0x280040, 0x1e0) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:25:29 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:25:29 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2092.059343] 9pnet: Insufficient options for proto=fd 03:25:29 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:25:29 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 18) [ 2092.066543] EXT4-fs (sda): Unrecognized mount option "test_dummy_e [ 2092.066543] cryption" or missing value [ 2092.076718] FAULT_INJECTION: forcing a failure. [ 2092.076718] name failslab, interval 1, probability 0, space 0, times 0 [ 2092.079145] CPU: 1 PID: 27446 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 2092.080583] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2092.081239] 9pnet: Insufficient options for proto=fd [ 2092.082234] Call Trace: [ 2092.082259] dump_stack+0x107/0x167 [ 2092.082293] should_fail.cold+0x5/0xa [ 2092.085319] ? selinux_perf_event_alloc+0x43/0x190 [ 2092.086318] should_failslab+0x5/0x20 [ 2092.087091] kmem_cache_alloc_trace+0x55/0x360 [ 2092.088016] ? perf_kprobe_init+0x1f9/0x280 [ 2092.088914] selinux_perf_event_alloc+0x43/0x190 [ 2092.089878] security_perf_event_alloc+0x46/0xa0 [ 2092.090842] perf_event_alloc.part.0+0x1877/0x2b30 [ 2092.091848] __do_sys_perf_event_open+0x580/0x2cb0 [ 2092.092859] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2092.093842] ? perf_event_set_output+0x5b0/0x5b0 [ 2092.094796] ? wait_for_completion_io+0x270/0x270 [ 2092.095780] ? __startup_64+0x7/0x3b0 [ 2092.096572] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2092.097634] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2092.098680] do_syscall_64+0x33/0x40 [ 2092.099436] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2092.100487] RIP: 0033:0x7fb9acc68b19 [ 2092.101245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2092.104869] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2092.106411] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 2092.107851] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 2092.109310] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2092.110748] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2092.112193] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 [ 2092.120616] EXT4-fs (sda): Unrecognized mount option "test_dummy_e [ 2092.120616] cryption" or missing value [ 2092.172357] FAULT_INJECTION: forcing a failure. [ 2092.172357] name failslab, interval 1, probability 0, space 0, times 0 [ 2092.175080] CPU: 0 PID: 27440 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2092.176491] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2092.178155] Call Trace: [ 2092.178694] dump_stack+0x107/0x167 [ 2092.179453] should_fail.cold+0x5/0xa [ 2092.180226] ? create_object.isra.0+0x3a/0xa20 [ 2092.181158] ? create_object.isra.0+0x3a/0xa20 [ 2092.182079] should_failslab+0x5/0x20 [ 2092.182844] kmem_cache_alloc+0x5b/0x360 [ 2092.183656] ? insert_revoke_hash+0x28/0x270 [ 2092.184557] create_object.isra.0+0x3a/0xa20 [ 2092.185441] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2092.186466] kmem_cache_alloc+0x159/0x360 [ 2092.187311] insert_revoke_hash+0x28/0x270 [ 2092.188190] jbd2_journal_revoke+0x2bb/0x570 [ 2092.189090] __ext4_forget+0x218/0x480 [ 2092.189891] ext4_free_blocks+0x2d3/0x20f0 [ 2092.190781] ? mark_held_locks+0x9e/0xe0 [ 2092.191602] ? ext4_mb_new_blocks+0x4890/0x4890 [ 2092.192763] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2092.194032] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2092.195312] ? trace_hardirqs_on+0x5b/0x180 [ 2092.196359] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2092.197651] ? wake_up_var+0x120/0x120 [ 2092.198608] ext4_xattr_release_block+0x3a3/0x910 [ 2092.199784] ext4_xattr_block_set+0x1f58/0x3010 [ 2092.200832] ? mark_held_locks+0x9e/0xe0 [ 2092.201665] ? ext4_xattr_ibody_set+0x2b0/0x2b0 [ 2092.202617] ? xattr_find_entry+0x2aa/0x3b0 [ 2092.203497] ? ext4_xattr_block_find+0x5c/0x6a0 [ 2092.204449] ext4_xattr_set_handle+0x1037/0x1320 [ 2092.205417] ? ext4_xattr_ibody_inline_set+0x3a0/0x3a0 [ 2092.206467] ? __jbd2_journal_unfile_buffer+0xb0/0xb0 [ 2092.207549] ? __ext4_journal_start_sb+0x214/0x430 [ 2092.208551] ? __ext4_journal_start_sb+0x1db/0x430 [ 2092.209541] ext4_xattr_set+0x13a/0x340 [ 2092.210356] ? ext4_xattr_set_credits+0x200/0x200 [ 2092.211324] ? down_write_nested+0x160/0x160 [ 2092.212214] ? xattr_resolve_name+0x26e/0x3e0 [ 2092.213122] ? ext4_initxattrs+0x120/0x120 [ 2092.213968] __vfs_removexattr+0xf9/0x170 [ 2092.214814] ? __vfs_getxattr+0x150/0x150 [ 2092.215664] cap_inode_killpriv+0x19/0x50 [ 2092.216501] security_inode_killpriv+0x46/0xa0 [ 2092.217421] setattr_prepare+0x19f/0x7e0 [ 2092.218245] ext4_setattr+0x1a8/0x22c0 [ 2092.219032] ? igrab+0xc0/0xc0 [ 2092.219677] ? ext4_xattr_security_set+0x40/0x40 [ 2092.220653] ? ext4_journalled_write_end+0x1240/0x1240 [ 2092.221700] notify_change+0xba2/0x1080 [ 2092.222513] file_remove_privs+0x386/0x540 [ 2092.223361] ? init_once+0x230/0x230 [ 2092.224115] ? generic_write_checks+0x2ad/0x390 [ 2092.225058] ? down_write+0xe0/0x160 [ 2092.225805] ? down_write_killable+0x180/0x180 [ 2092.226728] file_modified+0x14/0xa0 [ 2092.227475] ext4_file_write_iter+0x906/0x18e0 [ 2092.228428] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2092.229370] new_sync_write+0x42c/0x660 [ 2092.230171] ? new_sync_read+0x6f0/0x6f0 [ 2092.231033] ? ksys_write+0x12d/0x260 [ 2092.231806] ? lock_release+0x6b0/0x6b0 [ 2092.232675] ? selinux_file_permission+0x36/0x510 [ 2092.233687] vfs_write+0x747/0xa30 [ 2092.234457] ksys_write+0x12d/0x260 [ 2092.235203] ? __ia32_sys_read+0xb0/0xb0 [ 2092.236048] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2092.237142] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2092.238198] do_syscall_64+0x33/0x40 [ 2092.238961] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2092.240017] RIP: 0033:0x7f06a9247b19 [ 2092.240783] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2092.244511] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2092.246061] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2092.247551] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2092.249035] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2092.250476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2092.251930] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:25:29 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:25:29 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:25:29 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:25:29 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_e\"cryption']) 03:25:29 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfbno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:25:29 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="7472616e733d66642c726664c6025e1cf05637e6c6a88b5600"/37, @ANYRESHEX]) [ 2092.436807] 9pnet: Insufficient options for proto=fd 03:25:29 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2092.444115] EXT4-fs (sda): Unrecognized mount option "test_dummy_e"cryption" or missing value [ 2092.457446] EXT4-fs (sda): Unrecognized mount option "test_dummy_e"cryption" or missing value [ 2092.477648] 9pnet: Insufficient options for proto=fd 03:25:43 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 19) 03:25:43 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 8) 03:25:43 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2106.184874] FAULT_INJECTION: forcing a failure. [ 2106.184874] name failslab, interval 1, probability 0, space 0, times 0 [ 2106.187252] CPU: 0 PID: 27884 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 2106.188469] EXT4-fs (sda): Unrecognized mount option "test_dummy_e%cryption" or missing value [ 2106.188668] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2106.188684] Call Trace: [ 2106.192571] 9pnet_virtio: no channels available for device 9p [ 2106.192685] dump_stack+0x107/0x167 [ 2106.194577] should_fail.cold+0x5/0xa [ 2106.195358] ? create_object.isra.0+0x3a/0xa20 [ 2106.196293] should_failslab+0x5/0x20 03:25:43 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_e%cryption']) 03:25:43 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:25:43 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:25:43 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfgno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:25:43 executing program 6: ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, &(0x7f0000000080)) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="37726f6e733d66022c726664", @ANYRESHEX]) [ 2106.197081] kmem_cache_alloc+0x5b/0x360 [ 2106.198097] ? mark_held_locks+0x9e/0xe0 [ 2106.198926] create_object.isra.0+0x3a/0xa20 [ 2106.199827] kmemleak_alloc_percpu+0xa0/0x100 [ 2106.200761] pcpu_alloc+0x4e2/0x12f0 [ 2106.201552] perf_trace_event_init+0x376/0x9c0 [ 2106.202491] perf_kprobe_init+0x1c5/0x280 [ 2106.203346] perf_kprobe_event_init+0xf8/0x1c0 [ 2106.204276] perf_try_init_event+0x130/0x570 [ 2106.205197] perf_event_alloc.part.0+0xd96/0x2b30 [ 2106.206190] __do_sys_perf_event_open+0x580/0x2cb0 [ 2106.207206] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2106.208190] ? perf_event_set_output+0x5b0/0x5b0 [ 2106.209153] ? wait_for_completion_io+0x270/0x270 [ 2106.209500] 9pnet: Insufficient options for proto=fd [ 2106.210142] ? __startup_64+0x7/0x3b0 [ 2106.210178] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2106.210210] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2106.214218] do_syscall_64+0x33/0x40 [ 2106.214975] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2106.216012] RIP: 0033:0x7fb9acc68b19 [ 2106.216776] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2106.220507] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2106.222035] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 2106.223475] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 2106.224918] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2106.226378] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2106.227817] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 [ 2106.234578] EXT4-fs (sda): Unrecognized mount option "test_dummy_e%cryption" or missing value [ 2106.280895] FAULT_INJECTION: forcing a failure. [ 2106.280895] name failslab, interval 1, probability 0, space 0, times 0 [ 2106.284111] CPU: 1 PID: 27879 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2106.285648] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2106.287465] Call Trace: [ 2106.288063] dump_stack+0x107/0x167 [ 2106.288884] should_fail.cold+0x5/0xa [ 2106.289732] ? create_object.isra.0+0x3a/0xa20 [ 2106.290749] should_failslab+0x5/0x20 [ 2106.291592] kmem_cache_alloc+0x5b/0x360 [ 2106.292503] ? ext4_free_blocks+0x915/0x20f0 [ 2106.293481] create_object.isra.0+0x3a/0xa20 [ 2106.294440] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2106.295544] kmem_cache_alloc+0x159/0x360 [ 2106.296475] ext4_free_blocks+0x915/0x20f0 [ 2106.297431] ? ext4_mb_new_blocks+0x4890/0x4890 [ 2106.298498] ext4_xattr_release_block+0x3a3/0x910 [ 2106.299571] ext4_xattr_block_set+0x1f58/0x3010 [ 2106.300615] ? mark_held_locks+0x9e/0xe0 [ 2106.301526] ? ext4_xattr_ibody_set+0x2b0/0x2b0 [ 2106.302554] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2106.303698] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2106.304906] ? trace_hardirqs_on+0x5b/0x180 [ 2106.305859] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2106.307070] ? ext4_xattr_set_handle+0x6a3/0x1320 [ 2106.308165] ext4_xattr_set_handle+0x1037/0x1320 [ 2106.309217] ? ext4_xattr_ibody_inline_set+0x3a0/0x3a0 [ 2106.310355] ? __jbd2_journal_unfile_buffer+0xb0/0xb0 [ 2106.311523] ? __ext4_journal_start_sb+0x214/0x430 [ 2106.312608] ? __ext4_journal_start_sb+0x1db/0x430 [ 2106.313692] ext4_xattr_set+0x13a/0x340 [ 2106.314585] ? ext4_xattr_set_credits+0x200/0x200 [ 2106.315627] ? finish_task_switch+0x126/0x5d0 [ 2106.316608] ? finish_task_switch+0xef/0x5d0 [ 2106.317563] ? __switch_to+0x572/0xff0 [ 2106.318412] ? __switch_to_asm+0x34/0x60 [ 2106.319294] ? xattr_resolve_name+0x26e/0x3e0 [ 2106.320277] ? ext4_initxattrs+0x120/0x120 [ 2106.321211] __vfs_removexattr+0xf9/0x170 [ 2106.322108] ? __vfs_getxattr+0x150/0x150 [ 2106.323028] cap_inode_killpriv+0x19/0x50 [ 2106.323930] security_inode_killpriv+0x46/0xa0 [ 2106.324955] setattr_prepare+0x19f/0x7e0 [ 2106.325845] ext4_setattr+0x1a8/0x22c0 [ 2106.326695] ? igrab+0xc0/0xc0 [ 2106.327378] ? ext4_xattr_security_set+0x40/0x40 [ 2106.328435] ? ext4_journalled_write_end+0x1240/0x1240 [ 2106.329568] notify_change+0xba2/0x1080 [ 2106.330443] file_remove_privs+0x386/0x540 [ 2106.331361] ? init_once+0x230/0x230 [ 2106.332171] ? generic_write_checks+0x2ad/0x390 [ 2106.333188] ? down_write+0xe0/0x160 [ 2106.333994] ? down_write_killable+0x180/0x180 [ 2106.334990] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2106.336126] file_modified+0x14/0xa0 [ 2106.336938] ext4_file_write_iter+0x906/0x18e0 [ 2106.337949] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2106.338943] ? __lockdep_reset_lock+0x180/0x180 [ 2106.339952] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2106.341096] ? SOFTIRQ_verbose+0x10/0x10 [ 2106.341993] new_sync_write+0x42c/0x660 [ 2106.342861] ? new_sync_read+0x6f0/0x6f0 [ 2106.343747] ? ksys_write+0x12d/0x260 [ 2106.344584] ? lock_release+0x6b0/0x6b0 [ 2106.345448] ? selinux_file_permission+0x36/0x510 [ 2106.346495] ? __fget_files+0x296/0x480 [ 2106.347374] vfs_write+0x747/0xa30 [ 2106.348159] ksys_write+0x12d/0x260 [ 2106.348959] ? __ia32_sys_read+0xb0/0xb0 [ 2106.349848] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2106.350982] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2106.352112] do_syscall_64+0x33/0x40 [ 2106.352937] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2106.354043] RIP: 0033:0x7f06a9247b19 [ 2106.354852] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2106.358815] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2106.360477] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2106.362018] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2106.363554] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2106.365092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2106.366630] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:25:43 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:25:43 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xc000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:25:43 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 20) 03:25:43 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:25:43 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_e,cryption']) [ 2106.464074] FAULT_INJECTION: forcing a failure. [ 2106.464074] name failslab, interval 1, probability 0, space 0, times 0 [ 2106.466603] CPU: 1 PID: 28097 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 2106.468085] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2106.469892] Call Trace: [ 2106.470466] dump_stack+0x107/0x167 [ 2106.471259] should_fail.cold+0x5/0xa [ 2106.472081] ? find_get_context+0x18d/0x9a0 [ 2106.473012] should_failslab+0x5/0x20 [ 2106.473834] kmem_cache_alloc_trace+0x55/0x360 [ 2106.474155] EXT4-fs (sda): Unrecognized mount option "test_dummy_e" or missing value [ 2106.474828] find_get_context+0x18d/0x9a0 [ 2106.474854] ? security_perf_event_alloc+0x79/0xa0 [ 2106.478385] ? ctx_sched_out+0xa00/0xa00 [ 2106.479283] __do_sys_perf_event_open+0xed5/0x2cb0 [ 2106.480373] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2106.481426] ? perf_event_set_output+0x5b0/0x5b0 [ 2106.482471] ? wait_for_completion_io+0x270/0x270 [ 2106.483529] ? __startup_64+0x7/0x3b0 [ 2106.484377] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2106.485511] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2106.486633] do_syscall_64+0x33/0x40 [ 2106.487447] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2106.488571] RIP: 0033:0x7fb9acc68b19 [ 2106.489386] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2106.493354] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2106.494996] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 2106.496543] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 2106.498072] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2106.499617] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2106.501156] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 03:25:43 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfqno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 2106.505145] EXT4-fs (sda): Unrecognized mount option "test_dummy_e" or missing value 03:25:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$cgroup_int(r0, &(0x7f0000000080)='cpu.weight.nice\x00', 0x2, 0x0) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:25:43 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2106.573573] 9pnet: Insufficient options for proto=fd [ 2106.621984] 9pnet: Insufficient options for proto=fd 03:25:59 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 9) 03:25:59 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:25:59 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX=r0, @ANYRESHEX, @ANYRES64]) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') newfstatat(0xffffffffffffff9c, &(0x7f0000001100)='./file1\x00', &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) stat(&(0x7f0000000000)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) mount$9p_fd(0x0, &(0x7f0000001080)='./file1\x00', &(0x7f00000010c0), 0x10021, &(0x7f00000011c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access', 0x3d, r2}}, {@mmap}, {@msize={'msize', 0x3d, 0x2}}, {@access_client}], [{@dont_appraise}, {@obj_role={'obj_role', 0x3d, 'net/mcfilter6\x00'}}, {@uid_lt={'uid<', r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x63, 0x62, 0x64, 0x63, 0x66, 0x32, 0x62, 0x39], 0x2d, [0x32, 0x36, 0x61, 0x34], 0x2d, [0x62, 0x61, 0x37, 0x37], 0x2d, [0x33, 0x64, 0x66, 0x63], 0x2d, [0x38, 0x0, 0x62, 0x32, 0x33, 0x61, 0x61, 0xd]}}}]}}) pread64(r1, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) r4 = fcntl$dupfd(r0, 0x0, r1) acct(&(0x7f0000001300)='./file1\x00') ioctl$int_in(r4, 0x5421, &(0x7f00000012c0)=0x1e62) clock_gettime(0x0, &(0x7f0000000380)) 03:25:59 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:25:59 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1e010000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2122.093584] 9pnet: Insufficient options for proto=fd 03:25:59 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_en\nryption']) 03:25:59 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfsno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:25:59 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 21) [ 2122.098348] 9pnet_virtio: no channels available for device 9p [ 2122.120412] EXT4-fs (sda): Unrecognized mount option "test_dummy_en [ 2122.120412] ryption" or missing value [ 2122.137836] FAULT_INJECTION: forcing a failure. 03:25:59 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2122.137836] name failslab, interval 1, probability 0, space 0, times 0 [ 2122.140433] CPU: 0 PID: 28367 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 2122.141855] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2122.143549] Call Trace: [ 2122.144091] dump_stack+0x107/0x167 [ 2122.144845] should_fail.cold+0x5/0xa [ 2122.145626] ? create_object.isra.0+0x3a/0xa20 [ 2122.146561] should_failslab+0x5/0x20 [ 2122.147350] kmem_cache_alloc+0x5b/0x360 [ 2122.148184] create_object.isra.0+0x3a/0xa20 [ 2122.149102] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2122.150151] kmem_cache_alloc_trace+0x151/0x360 [ 2122.151117] selinux_perf_event_alloc+0x43/0x190 [ 2122.152090] security_perf_event_alloc+0x46/0xa0 [ 2122.153070] perf_event_alloc.part.0+0x1877/0x2b30 [ 2122.154086] __do_sys_perf_event_open+0x580/0x2cb0 [ 2122.155092] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2122.156063] ? perf_event_set_output+0x5b0/0x5b0 [ 2122.157027] ? wait_for_completion_io+0x270/0x270 [ 2122.158016] ? __startup_64+0x7/0x3b0 [ 2122.158802] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2122.159859] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2122.160946] do_syscall_64+0x33/0x40 [ 2122.161700] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2122.162741] RIP: 0033:0x7fb9acc68b19 [ 2122.163501] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2122.167234] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2122.168778] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 2122.170222] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 2122.171663] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2122.173126] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2122.174588] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 [ 2122.186239] EXT4-fs (sda): Unrecognized mount option "test_dummy_en [ 2122.186239] ryption" or missing value 03:25:59 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfuno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 2122.218836] FAULT_INJECTION: forcing a failure. [ 2122.218836] name failslab, interval 1, probability 0, space 0, times 0 [ 2122.221664] CPU: 1 PID: 28332 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2122.222556] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2122.223604] Call Trace: [ 2122.223947] dump_stack+0x107/0x167 [ 2122.224417] should_fail.cold+0x5/0xa [ 2122.224926] ? jbd2__journal_start+0x190/0x890 [ 2122.225511] should_failslab+0x5/0x20 [ 2122.226002] kmem_cache_alloc+0x5b/0x360 [ 2122.226527] jbd2__journal_start+0x190/0x890 [ 2122.227105] __ext4_journal_start_sb+0x214/0x430 [ 2122.227717] ext4_dirty_inode+0xbc/0x130 [ 2122.228239] ? ext4_setattr+0x22c0/0x22c0 [ 2122.228778] __mark_inode_dirty+0x492/0xf10 [ 2122.229327] ? ext4_fc_start_update+0xa2/0x2e0 [ 2122.229917] ext4_setattr+0x7db/0x22c0 [ 2122.230416] ? igrab+0xc0/0xc0 [ 2122.230820] ? ext4_xattr_security_set+0x40/0x40 [ 2122.231429] ? ext4_journalled_write_end+0x1240/0x1240 [ 2122.232090] notify_change+0xba2/0x1080 [ 2122.232578] file_remove_privs+0x386/0x540 [ 2122.233095] ? init_once+0x230/0x230 [ 2122.233564] ? generic_write_checks+0x2ad/0x390 [ 2122.234121] ? down_write+0xe0/0x160 [ 2122.234596] ? down_write_killable+0x180/0x180 [ 2122.235178] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2122.235849] file_modified+0x14/0xa0 [ 2122.236321] ext4_file_write_iter+0x906/0x18e0 [ 2122.236929] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2122.237507] ? __lockdep_reset_lock+0x180/0x180 [ 2122.238108] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2122.238785] ? SOFTIRQ_verbose+0x10/0x10 [ 2122.239304] new_sync_write+0x42c/0x660 [ 2122.239812] ? new_sync_read+0x6f0/0x6f0 [ 2122.240325] ? ksys_write+0x12d/0x260 [ 2122.240829] ? lock_release+0x6b0/0x6b0 [ 2122.241334] ? selinux_file_permission+0x36/0x510 [ 2122.241953] ? __fget_files+0x296/0x480 [ 2122.242470] vfs_write+0x747/0xa30 [ 2122.242923] ksys_write+0x12d/0x260 [ 2122.243386] ? __ia32_sys_read+0xb0/0xb0 [ 2122.243914] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2122.244597] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2122.245262] do_syscall_64+0x33/0x40 [ 2122.245733] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2122.246386] RIP: 0033:0x7f06a9247b19 [ 2122.246861] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2122.249229] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2122.250207] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2122.251102] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2122.252017] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2122.252945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2122.253854] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:25:59 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:25:59 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2122.313415] 9pnet: Insufficient options for proto=fd 03:26:15 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:26:15 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 10) 03:26:15 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 22) 03:26:15 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_en\"ryption']) 03:26:15 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:26:15 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x70000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:26:15 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfwno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:26:15 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 2138.406505] EXT4-fs (sda): Unrecognized mount option "test_dummy_en"ryption" or missing value [ 2138.414036] 9pnet: Insufficient options for proto=fd [ 2138.418140] FAULT_INJECTION: forcing a failure. [ 2138.418140] name failslab, interval 1, probability 0, space 0, times 0 [ 2138.420466] CPU: 0 PID: 28671 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 2138.421791] 9pnet: Insufficient options for proto=fd [ 2138.421893] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2138.421910] Call Trace: [ 2138.425152] dump_stack+0x107/0x167 [ 2138.425897] should_fail.cold+0x5/0xa [ 2138.426675] ? find_get_context+0x18d/0x9a0 [ 2138.427542] should_failslab+0x5/0x20 [ 2138.428309] kmem_cache_alloc_trace+0x55/0x360 [ 2138.429244] find_get_context+0x18d/0x9a0 [ 2138.430077] ? security_perf_event_alloc+0x79/0xa0 [ 2138.431083] ? ctx_sched_out+0xa00/0xa00 [ 2138.431928] __do_sys_perf_event_open+0xed5/0x2cb0 [ 2138.432948] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2138.433922] ? perf_event_set_output+0x5b0/0x5b0 [ 2138.434867] ? wait_for_completion_io+0x270/0x270 [ 2138.435845] ? __startup_64+0x7/0x3b0 [ 2138.436631] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2138.437692] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2138.438744] do_syscall_64+0x33/0x40 [ 2138.439493] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2138.440531] RIP: 0033:0x7fb9acc68b19 [ 2138.441325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2138.445004] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2138.446543] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 2138.447992] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 2138.449439] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2138.450884] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2138.452316] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 [ 2138.460428] EXT4-fs (sda): Unrecognized mount option "test_dummy_en"ryption" or missing value [ 2138.486112] FAULT_INJECTION: forcing a failure. [ 2138.486112] name failslab, interval 1, probability 0, space 0, times 0 [ 2138.489817] CPU: 0 PID: 28669 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2138.491228] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2138.492942] Call Trace: [ 2138.493489] dump_stack+0x107/0x167 [ 2138.494244] should_fail.cold+0x5/0xa [ 2138.495038] ? create_object.isra.0+0x3a/0xa20 [ 2138.495981] should_failslab+0x5/0x20 [ 2138.496773] kmem_cache_alloc+0x5b/0x360 [ 2138.497612] create_object.isra.0+0x3a/0xa20 [ 2138.498515] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2138.499544] kmem_cache_alloc+0x159/0x360 [ 2138.500410] jbd2__journal_start+0x190/0x890 [ 2138.501335] __ext4_journal_start_sb+0x214/0x430 [ 2138.502321] ext4_dirty_inode+0xbc/0x130 [ 2138.503166] ? ext4_setattr+0x22c0/0x22c0 [ 2138.504011] __mark_inode_dirty+0x492/0xf10 [ 2138.504904] ? ext4_fc_start_update+0xa2/0x2e0 [ 2138.505864] ext4_setattr+0x7db/0x22c0 [ 2138.506673] ? igrab+0xc0/0xc0 [ 2138.507340] ? ext4_xattr_security_set+0x40/0x40 [ 2138.508341] ? ext4_journalled_write_end+0x1240/0x1240 [ 2138.509467] notify_change+0xba2/0x1080 [ 2138.510294] file_remove_privs+0x386/0x540 [ 2138.511195] ? init_once+0x230/0x230 [ 2138.511953] ? generic_write_checks+0x2ad/0x390 [ 2138.512916] ? down_write+0xe0/0x160 [ 2138.513674] ? down_write_killable+0x180/0x180 [ 2138.514592] ? write_comp_data+0xa/0x80 [ 2138.515401] file_modified+0x14/0xa0 [ 2138.516152] ext4_file_write_iter+0x906/0x18e0 [ 2138.517109] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2138.518050] ? new_sync_write+0x10e/0x660 [ 2138.518894] new_sync_write+0x42c/0x660 [ 2138.519707] ? new_sync_read+0x6f0/0x6f0 [ 2138.520530] ? ksys_write+0x12d/0x260 [ 2138.521324] ? lock_release+0x6b0/0x6b0 [ 2138.522144] ? selinux_file_permission+0x36/0x510 [ 2138.523144] ? __fget_files+0x296/0x480 [ 2138.523972] vfs_write+0x747/0xa30 [ 2138.524713] ksys_write+0x12d/0x260 [ 2138.525456] ? __ia32_sys_read+0xb0/0xb0 [ 2138.526300] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2138.527361] do_syscall_64+0x33/0x40 [ 2138.528125] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2138.529175] RIP: 0033:0x7f06a9247b19 [ 2138.529931] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2138.533678] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2138.535206] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2138.536646] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2138.538114] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2138.539580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2138.541051] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:26:15 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:26:15 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:26:15 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xf5ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:26:15 executing program 6: ioctl$F2FS_IOC_WRITE_CHECKPOINT(0xffffffffffffffff, 0xf507, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:26:15 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_en%ryption']) 03:26:15 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd\"o=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:26:15 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 23) [ 2138.664708] EXT4-fs (sda): Unrecognized mount option "test_dummy_en%ryption" or missing value [ 2138.666040] 9pnet: Insufficient options for proto=fd [ 2138.693375] EXT4-fs (sda): Unrecognized mount option "test_dummy_en%ryption" or missing value [ 2138.727385] 9pnet: Insufficient options for proto=fd 03:26:15 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:26:15 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2138.757743] FAULT_INJECTION: forcing a failure. [ 2138.757743] name failslab, interval 1, probability 0, space 0, times 0 [ 2138.760031] CPU: 1 PID: 28879 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 2138.761468] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2138.763128] Call Trace: [ 2138.763681] dump_stack+0x107/0x167 [ 2138.764418] should_fail.cold+0x5/0xa [ 2138.765228] ? create_object.isra.0+0x3a/0xa20 [ 2138.766161] should_failslab+0x5/0x20 [ 2138.766938] kmem_cache_alloc+0x5b/0x360 [ 2138.767772] create_object.isra.0+0x3a/0xa20 [ 2138.768658] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2138.769711] kmem_cache_alloc_trace+0x151/0x360 [ 2138.770656] find_get_context+0x18d/0x9a0 [ 2138.771487] ? security_perf_event_alloc+0x79/0xa0 [ 2138.772473] ? ctx_sched_out+0xa00/0xa00 [ 2138.773317] __do_sys_perf_event_open+0xed5/0x2cb0 [ 2138.774311] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2138.775289] ? perf_event_set_output+0x5b0/0x5b0 [ 2138.776236] ? wait_for_completion_io+0x270/0x270 [ 2138.777233] ? __startup_64+0x7/0x3b0 [ 2138.778011] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2138.779066] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2138.780114] do_syscall_64+0x33/0x40 [ 2138.780871] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2138.781896] RIP: 0033:0x7fb9acc68b19 [ 2138.782647] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2138.786329] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2138.787854] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 2138.789312] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 2138.790737] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2138.792162] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2138.793598] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 03:26:32 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 11) 03:26:32 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 24) 03:26:32 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_en,ryption']) 03:26:32 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:26:32 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r0, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) openat(r0, &(0x7f0000000080)='./file1\x00', 0x103000, 0x228) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:26:32 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:26:32 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xf9030000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:26:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd,o=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 2155.260314] EXT4-fs (sda): Unrecognized mount option "test_dummy_en" or missing value [ 2155.261933] 9pnet: Insufficient options for proto=fd [ 2155.269893] 9pnet: Insufficient options for proto=fd [ 2155.281282] EXT4-fs (sda): Unrecognized mount option "test_dummy_en" or missing value [ 2155.285815] FAULT_INJECTION: forcing a failure. [ 2155.285815] name failslab, interval 1, probability 0, space 0, times 0 [ 2155.288165] CPU: 1 PID: 29031 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 2155.289613] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2155.291340] Call Trace: [ 2155.291887] dump_stack+0x107/0x167 [ 2155.292647] should_fail.cold+0x5/0xa [ 2155.293441] ? __alloc_file+0x21/0x320 [ 2155.294243] should_failslab+0x5/0x20 [ 2155.295035] kmem_cache_alloc+0x5b/0x360 [ 2155.295867] __alloc_file+0x21/0x320 [ 2155.296645] alloc_empty_file+0x6d/0x170 [ 2155.297520] alloc_file+0x59/0x5a0 [ 2155.298258] alloc_file_pseudo+0x16a/0x250 [ 2155.299127] ? alloc_file+0x5a0/0x5a0 [ 2155.299923] ? ctx_sched_out+0xa00/0xa00 [ 2155.300757] anon_inode_getfile+0xc8/0x1f0 [ 2155.301635] __do_sys_perf_event_open+0xf5d/0x2cb0 [ 2155.302648] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2155.303640] ? perf_event_set_output+0x5b0/0x5b0 [ 2155.304602] ? wait_for_completion_io+0x270/0x270 [ 2155.305616] ? __startup_64+0x7/0x3b0 [ 2155.306418] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2155.307494] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2155.308557] do_syscall_64+0x33/0x40 [ 2155.309323] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2155.310365] RIP: 0033:0x7fb9acc68b19 [ 2155.311128] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2155.314855] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2155.316405] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 2155.317871] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 2155.318834] FAULT_INJECTION: forcing a failure. [ 2155.318834] name failslab, interval 1, probability 0, space 0, times 0 [ 2155.319315] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2155.319328] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2155.319340] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 [ 2155.323963] CPU: 0 PID: 29011 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2155.324785] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2155.325795] Call Trace: [ 2155.326135] dump_stack+0x107/0x167 [ 2155.326604] should_fail.cold+0x5/0xa [ 2155.327081] ? jbd2__journal_start+0x190/0x890 [ 2155.327651] should_failslab+0x5/0x20 [ 2155.328125] kmem_cache_alloc+0x5b/0x360 [ 2155.328634] jbd2__journal_start+0x190/0x890 [ 2155.329206] __ext4_journal_start_sb+0x214/0x430 [ 2155.329787] ext4_dirty_inode+0xbc/0x130 [ 2155.330283] ? ext4_setattr+0x22c0/0x22c0 [ 2155.330801] __mark_inode_dirty+0x492/0xf10 [ 2155.331348] generic_update_time+0x21c/0x370 [ 2155.331893] file_update_time+0x43a/0x520 [ 2155.332396] ? evict_inodes+0x420/0x420 [ 2155.332893] ? down_write_killable+0x180/0x180 [ 2155.333449] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2155.334094] file_modified+0x7d/0xa0 [ 2155.334547] ext4_file_write_iter+0x906/0x18e0 [ 2155.335131] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2155.335693] ? __lockdep_reset_lock+0x180/0x180 [ 2155.336274] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2155.336920] ? SOFTIRQ_verbose+0x10/0x10 [ 2155.337438] new_sync_write+0x42c/0x660 [ 2155.337910] ? new_sync_read+0x6f0/0x6f0 [ 2155.338392] ? ksys_write+0x12d/0x260 [ 2155.338855] ? lock_release+0x6b0/0x6b0 [ 2155.339348] ? selinux_file_permission+0x36/0x510 [ 2155.339937] ? __fget_files+0x296/0x480 [ 2155.340430] vfs_write+0x747/0xa30 [ 2155.340871] ksys_write+0x12d/0x260 [ 2155.341317] ? __ia32_sys_read+0xb0/0xb0 [ 2155.341808] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2155.342451] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2155.343079] do_syscall_64+0x33/0x40 [ 2155.343530] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2155.344143] RIP: 0033:0x7f06a9247b19 [ 2155.344597] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2155.346855] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2155.347781] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2155.348660] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2155.349545] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2155.350405] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2155.351269] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:26:32 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:26:32 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfeffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:26:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdn\"=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:26:32 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_enc\nyption']) 03:26:32 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:26:32 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2155.465590] 9pnet: Insufficient options for proto=fd 03:26:32 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000180)={0x0, 0x0}) r4 = getpid() prlimit64(r4, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) r5 = getpid() prlimit64(r5, 0x0, &(0x7f0000000000), 0x0) r6 = getpid() prlimit64(r6, 0x0, &(0x7f0000000000), 0x0) clone3(&(0x7f0000000440)={0x800000, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0x39}, &(0x7f0000000240)=""/190, 0xbe, &(0x7f0000000300)=""/228, &(0x7f0000000400)=[r1, r1, r1, r2, r3, r4, r5, r6], 0x8, {r0}}, 0x58) 03:26:32 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 25) [ 2155.581157] 9pnet: Insufficient options for proto=fd [ 2155.589341] EXT4-fs (sda): Unrecognized mount option "test_dummy_enc [ 2155.589341] yption" or missing value [ 2155.594603] FAULT_INJECTION: forcing a failure. [ 2155.594603] name failslab, interval 1, probability 0, space 0, times 0 [ 2155.598764] CPU: 1 PID: 29349 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 2155.600320] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2155.602188] Call Trace: [ 2155.602788] dump_stack+0x107/0x167 [ 2155.603614] should_fail.cold+0x5/0xa [ 2155.604492] ? create_object.isra.0+0x3a/0xa20 [ 2155.605530] should_failslab+0x5/0x20 [ 2155.606390] kmem_cache_alloc+0x5b/0x360 [ 2155.607306] create_object.isra.0+0x3a/0xa20 [ 2155.608303] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2155.609480] kmem_cache_alloc+0x159/0x360 [ 2155.610430] __d_alloc+0x2a/0x990 [ 2155.611230] d_alloc_pseudo+0x19/0x70 [ 2155.612096] alloc_file_pseudo+0xce/0x250 [ 2155.613043] ? alloc_file+0x5a0/0x5a0 [ 2155.613912] ? ctx_sched_out+0xa00/0xa00 [ 2155.614829] anon_inode_getfile+0xc8/0x1f0 [ 2155.615783] __do_sys_perf_event_open+0xf5d/0x2cb0 [ 2155.616883] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2155.617977] ? perf_event_set_output+0x5b0/0x5b0 [ 2155.619028] ? wait_for_completion_io+0x270/0x270 [ 2155.620121] ? __startup_64+0x7/0x3b0 [ 2155.621005] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2155.622184] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2155.623339] do_syscall_64+0x33/0x40 [ 2155.624170] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2155.625309] RIP: 0033:0x7fb9acc68b19 [ 2155.626171] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2155.626869] 9pnet: Insufficient options for proto=fd 03:26:32 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 12) 03:26:32 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffff8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:26:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdn,=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 2155.630240] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2155.630264] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 2155.630276] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 2155.630288] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2155.630307] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2155.639022] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 03:26:32 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2155.661824] EXT4-fs (sda): Unrecognized mount option "test_dummy_enc [ 2155.661824] yption" or missing value 03:26:32 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2155.689880] FAULT_INJECTION: forcing a failure. [ 2155.689880] name failslab, interval 1, probability 0, space 0, times 0 [ 2155.691793] CPU: 0 PID: 29363 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2155.692539] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2155.693451] Call Trace: [ 2155.693744] dump_stack+0x107/0x167 [ 2155.694141] should_fail.cold+0x5/0xa [ 2155.694551] ? create_object.isra.0+0x3a/0xa20 [ 2155.695051] should_failslab+0x5/0x20 [ 2155.695470] kmem_cache_alloc+0x5b/0x360 [ 2155.695909] create_object.isra.0+0x3a/0xa20 [ 2155.696379] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2155.696927] kmem_cache_alloc+0x159/0x360 [ 2155.697400] jbd2__journal_start+0x190/0x890 [ 2155.697879] __ext4_journal_start_sb+0x214/0x430 [ 2155.698394] ext4_dirty_inode+0xbc/0x130 [ 2155.698829] ? ext4_setattr+0x22c0/0x22c0 [ 2155.699274] __mark_inode_dirty+0x492/0xf10 [ 2155.699745] generic_update_time+0x21c/0x370 [ 2155.700219] file_update_time+0x43a/0x520 [ 2155.700669] ? evict_inodes+0x420/0x420 [ 2155.701099] ? ext4_inode_journal_mode+0x1c0/0x4f0 [ 2155.701624] ? ext4_inode_journal_mode+0x295/0x4f0 [ 2155.702151] file_modified+0x7d/0xa0 [ 2155.702552] ext4_file_write_iter+0x906/0x18e0 [ 2155.703054] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2155.703552] ? new_sync_write+0x519/0x660 [ 2155.703998] new_sync_write+0x42c/0x660 [ 2155.704418] ? new_sync_read+0x6f0/0x6f0 [ 2155.704852] ? ksys_write+0x12d/0x260 [ 2155.705287] ? lock_release+0x6b0/0x6b0 [ 2155.705717] ? selinux_file_permission+0x36/0x510 [ 2155.706239] vfs_write+0x747/0xa30 [ 2155.706620] ksys_write+0x12d/0x260 [ 2155.707009] ? __ia32_sys_read+0xb0/0xb0 [ 2155.707443] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2155.708007] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2155.708583] do_syscall_64+0x33/0x40 [ 2155.709006] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2155.709552] RIP: 0033:0x7f06a9247b19 [ 2155.709941] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2155.711866] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2155.712666] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2155.713424] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2155.714175] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2155.714922] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2155.715680] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:26:32 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:26:50 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_enc\"yption']) 03:26:50 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 13) 03:26:50 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 26) 03:26:50 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno\"', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 03:26:50 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:26:50 executing program 6: fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000000c0)={0x2, 0xffffffffffffffff}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f0000000180)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) openat$cgroup_devices(r0, &(0x7f0000000240)='devices.allow\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r1, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) openat(r1, &(0x7f0000000280)='./file1\x00', 0x220000, 0x27) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x80) close(r2) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs/custom1\x00', 0x802, 0x0) ftruncate(r3, 0x9) 03:26:50 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:26:50 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2173.252008] FAULT_INJECTION: forcing a failure. [ 2173.252008] name failslab, interval 1, probability 0, space 0, times 0 [ 2173.254454] CPU: 0 PID: 29484 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 2173.254703] 9pnet: Insufficient options for proto=fd [ 2173.255861] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2173.255868] Call Trace: [ 2173.255894] dump_stack+0x107/0x167 [ 2173.255922] should_fail.cold+0x5/0xa [ 2173.258282] EXT4-fs (sda): Unrecognized mount option "test_dummy_enc"yption" or missing value [ 2173.258663] ? __alloc_file+0x21/0x320 [ 2173.260287] 9pnet: Insufficient options for proto=fd [ 2173.260670] should_failslab+0x5/0x20 [ 2173.264980] kmem_cache_alloc+0x5b/0x360 [ 2173.265829] __alloc_file+0x21/0x320 [ 2173.266600] alloc_empty_file+0x6d/0x170 [ 2173.267436] alloc_file+0x59/0x5a0 [ 2173.268171] alloc_file_pseudo+0x16a/0x250 [ 2173.269042] ? alloc_file+0x5a0/0x5a0 [ 2173.269852] ? ctx_sched_out+0xa00/0xa00 [ 2173.270691] anon_inode_getfile+0xc8/0x1f0 [ 2173.271564] __do_sys_perf_event_open+0xf5d/0x2cb0 [ 2173.272582] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2173.273580] ? perf_event_set_output+0x5b0/0x5b0 [ 2173.274552] ? wait_for_completion_io+0x270/0x270 [ 2173.275556] ? __startup_64+0x7/0x3b0 [ 2173.276351] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2173.277434] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2173.278502] do_syscall_64+0x33/0x40 [ 2173.279270] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2173.280325] RIP: 0033:0x7fb9acc68b19 [ 2173.281087] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2173.284870] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2173.286446] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 2173.287890] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 2173.289341] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2173.290782] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2173.292236] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 [ 2173.299420] EXT4-fs (sda): Unrecognized mount option "test_dummy_enc"yption" or missing value 03:26:50 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:26:50 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:26:50 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_enc%yption']) 03:26:50 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2173.416753] FAULT_INJECTION: forcing a failure. [ 2173.416753] name failslab, interval 1, probability 0, space 0, times 0 [ 2173.419687] CPU: 0 PID: 29479 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2173.421119] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2173.422821] Call Trace: [ 2173.423374] dump_stack+0x107/0x167 [ 2173.424123] should_fail.cold+0x5/0xa [ 2173.424918] ? jbd2__journal_start+0x190/0x890 [ 2173.425862] should_failslab+0x5/0x20 [ 2173.426639] kmem_cache_alloc+0x5b/0x360 [ 2173.427479] jbd2__journal_start+0x190/0x890 [ 2173.428388] __ext4_journal_start_sb+0x214/0x430 [ 2173.429378] ext4_file_write_iter+0xdbf/0x18e0 [ 2173.430334] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2173.431265] ? __lockdep_reset_lock+0x180/0x180 [ 2173.432215] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2173.433292] ? SOFTIRQ_verbose+0x10/0x10 [ 2173.434136] new_sync_write+0x42c/0x660 [ 2173.434952] ? new_sync_read+0x6f0/0x6f0 [ 2173.435786] ? ksys_write+0x12d/0x260 [ 2173.436570] ? lock_release+0x6b0/0x6b0 [ 2173.437396] ? selinux_file_permission+0x36/0x510 [ 2173.438392] ? __fget_files+0x296/0x480 [ 2173.439226] vfs_write+0x747/0xa30 [ 2173.439965] ksys_write+0x12d/0x260 [ 2173.440712] ? __ia32_sys_read+0xb0/0xb0 [ 2173.441564] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2173.442646] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2173.443711] do_syscall_64+0x33/0x40 [ 2173.444476] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2173.445561] RIP: 0033:0x7f06a9247b19 [ 2173.446327] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2173.450093] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2173.451652] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2173.453105] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2173.454564] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2173.456020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2173.457478] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 [ 2173.578057] EXT4-fs (sda): Unrecognized mount option "test_dummy_enc%yption" or missing value [ 2173.608841] EXT4-fs (sda): Unrecognized mount option "test_dummy_enc%yption" or missing value 03:27:07 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:27:07 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_enc,yption']) 03:27:07 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x114e8b7b904, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:27:07 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 27) 03:27:07 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2190.076261] EXT4-fs (sda): Unrecognized mount option "test_dummy_enc" or missing value 03:27:07 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 14) 03:27:07 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno,', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 2190.094545] FAULT_INJECTION: forcing a failure. [ 2190.094545] name failslab, interval 1, probability 0, space 0, times 0 [ 2190.097131] CPU: 1 PID: 29716 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 2190.098235] 9pnet: Insufficient options for proto=fd [ 2190.098613] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2190.098620] Call Trace: [ 2190.098653] dump_stack+0x107/0x167 [ 2190.102634] should_fail.cold+0x5/0xa [ 2190.103415] ? create_object.isra.0+0x3a/0xa20 [ 2190.104358] should_failslab+0x5/0x20 [ 2190.105133] kmem_cache_alloc+0x5b/0x360 [ 2190.105972] ? percpu_ref_put_many.constprop.0+0x4e/0x100 [ 2190.107099] create_object.isra.0+0x3a/0xa20 [ 2190.107995] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2190.109034] kmem_cache_alloc+0x159/0x360 [ 2190.109903] security_file_alloc+0x34/0x170 [ 2190.110791] __alloc_file+0xb6/0x320 [ 2190.111553] alloc_empty_file+0x6d/0x170 [ 2190.112383] alloc_file+0x59/0x5a0 [ 2190.113115] alloc_file_pseudo+0x16a/0x250 [ 2190.114000] ? alloc_file+0x5a0/0x5a0 [ 2190.114791] ? ctx_sched_out+0xa00/0xa00 [ 2190.115625] anon_inode_getfile+0xc8/0x1f0 [ 2190.116492] __do_sys_perf_event_open+0xf5d/0x2cb0 [ 2190.117517] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2190.118500] ? perf_event_set_output+0x5b0/0x5b0 [ 2190.119461] ? wait_for_completion_io+0x270/0x270 [ 2190.120452] ? __startup_64+0x7/0x3b0 [ 2190.121242] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2190.122326] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2190.123379] do_syscall_64+0x33/0x40 [ 2190.124139] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2190.125179] RIP: 0033:0x7fb9acc68b19 [ 2190.125944] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2190.129697] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2190.131261] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 2190.132718] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 2190.134189] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2190.135648] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2190.137102] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 03:27:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) clone3(&(0x7f0000000440)={0x12000, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0x2b}, &(0x7f0000000240)=""/223, 0xdf, &(0x7f0000000340)=""/224, &(0x7f0000000180)=[r2, r1, r1], 0x3, {r0}}, 0x58) [ 2190.146217] EXT4-fs (sda): Unrecognized mount option "test_dummy_enc" or missing value [ 2190.158803] 9pnet: Insufficient options for proto=fd 03:27:07 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:27:07 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:27:07 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encr\nption']) 03:27:07 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:27:07 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 28) [ 2190.275147] FAULT_INJECTION: forcing a failure. [ 2190.275147] name failslab, interval 1, probability 0, space 0, times 0 [ 2190.278842] CPU: 1 PID: 29720 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2190.280289] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2190.282027] Call Trace: [ 2190.282580] dump_stack+0x107/0x167 [ 2190.283345] should_fail.cold+0x5/0xa [ 2190.284141] ? create_object.isra.0+0x3a/0xa20 [ 2190.285081] ? create_object.isra.0+0x3a/0xa20 [ 2190.286028] should_failslab+0x5/0x20 [ 2190.286808] kmem_cache_alloc+0x5b/0x360 [ 2190.287639] ? jbd2__journal_start+0x190/0x890 [ 2190.288579] create_object.isra.0+0x3a/0xa20 [ 2190.289485] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2190.290534] kmem_cache_alloc+0x159/0x360 [ 2190.291394] jbd2__journal_start+0x190/0x890 [ 2190.292306] __ext4_journal_start_sb+0x214/0x430 [ 2190.293312] ext4_file_write_iter+0xdbf/0x18e0 [ 2190.294294] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2190.295232] ? __lockdep_reset_lock+0x180/0x180 [ 2190.296202] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2190.297286] ? SOFTIRQ_verbose+0x10/0x10 [ 2190.298144] new_sync_write+0x42c/0x660 [ 2190.298971] ? new_sync_read+0x6f0/0x6f0 [ 2190.299794] ? ksys_write+0x12d/0x260 [ 2190.300590] ? lock_release+0x6b0/0x6b0 [ 2190.301399] ? selinux_file_permission+0x36/0x510 [ 2190.302489] ? __fget_files+0x296/0x480 [ 2190.303313] vfs_write+0x747/0xa30 [ 2190.304049] ksys_write+0x12d/0x260 [ 2190.304784] ? __ia32_sys_read+0xb0/0xb0 [ 2190.305631] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2190.306690] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2190.307755] do_syscall_64+0x33/0x40 [ 2190.308511] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2190.309589] RIP: 0033:0x7f06a9247b19 [ 2190.310343] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2190.314111] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2190.315643] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2190.317096] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2190.318559] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2190.320015] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2190.321483] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:27:07 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB='\"wfdno=', @ANYRESHEX=r1]) [ 2190.375165] FAULT_INJECTION: forcing a failure. [ 2190.375165] name failslab, interval 1, probability 0, space 0, times 0 [ 2190.377541] CPU: 1 PID: 29936 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 2190.378963] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2190.380661] Call Trace: [ 2190.381218] dump_stack+0x107/0x167 [ 2190.381985] should_fail.cold+0x5/0xa [ 2190.382774] ? security_file_alloc+0x34/0x170 [ 2190.383713] should_failslab+0x5/0x20 [ 2190.384513] kmem_cache_alloc+0x5b/0x360 [ 2190.385353] security_file_alloc+0x34/0x170 [ 2190.386268] __alloc_file+0xb6/0x320 [ 2190.387029] alloc_empty_file+0x6d/0x170 [ 2190.387867] alloc_file+0x59/0x5a0 [ 2190.388589] alloc_file_pseudo+0x16a/0x250 [ 2190.389482] ? alloc_file+0x5a0/0x5a0 [ 2190.390265] ? ctx_sched_out+0xa00/0xa00 [ 2190.391105] anon_inode_getfile+0xc8/0x1f0 [ 2190.391959] __do_sys_perf_event_open+0xf5d/0x2cb0 [ 2190.392979] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2190.394011] ? perf_event_set_output+0x5b0/0x5b0 [ 2190.394979] ? wait_for_completion_io+0x270/0x270 [ 2190.395982] ? __startup_64+0x7/0x3b0 [ 2190.396776] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2190.397869] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2190.398926] do_syscall_64+0x33/0x40 [ 2190.399696] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2190.400743] RIP: 0033:0x7fb9acc68b19 [ 2190.401520] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2190.405270] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2190.406881] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 2190.408576] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 2190.410282] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2190.411978] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2190.413691] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 [ 2190.416716] 9pnet: Insufficient options for proto=fd [ 2190.421555] EXT4-fs (sda): Unrecognized mount option "test_dummy_encr [ 2190.421555] ption" or missing value [ 2190.434361] EXT4-fs (sda): Unrecognized mount option "test_dummy_encr [ 2190.434361] ption" or missing value 03:27:23 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 15) 03:27:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:27:23 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:27:23 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:27:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r1, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) clone3(&(0x7f0000001080)={0x52e0300, 0x0, 0x0, 0x0, {0x2e}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYRES32, @ANYBLOB="080000042e2f66696c653100"]) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:27:23 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encr\"ption']) 03:27:23 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',\"fdno=', @ANYRESHEX=r1]) 03:27:23 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 29) [ 2206.331500] FAULT_INJECTION: forcing a failure. [ 2206.331500] name failslab, interval 1, probability 0, space 0, times 0 [ 2206.333858] CPU: 1 PID: 30051 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 2206.335270] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2206.336946] Call Trace: [ 2206.337497] dump_stack+0x107/0x167 [ 2206.338254] should_fail.cold+0x5/0xa [ 2206.339041] ? create_object.isra.0+0x3a/0xa20 [ 2206.339975] should_failslab+0x5/0x20 [ 2206.340747] kmem_cache_alloc+0x5b/0x360 [ 2206.341576] ? percpu_ref_put_many.constprop.0+0x4e/0x100 [ 2206.342714] create_object.isra.0+0x3a/0xa20 [ 2206.343608] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2206.344646] kmem_cache_alloc+0x159/0x360 [ 2206.345498] security_file_alloc+0x34/0x170 [ 2206.346392] __alloc_file+0xb6/0x320 [ 2206.347160] alloc_empty_file+0x6d/0x170 [ 2206.347992] alloc_file+0x59/0x5a0 [ 2206.348723] alloc_file_pseudo+0x16a/0x250 [ 2206.349586] ? alloc_file+0x5a0/0x5a0 [ 2206.350388] ? ctx_sched_out+0xa00/0xa00 [ 2206.351231] anon_inode_getfile+0xc8/0x1f0 [ 2206.352099] __do_sys_perf_event_open+0xf5d/0x2cb0 [ 2206.353103] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2206.354102] ? perf_event_set_output+0x5b0/0x5b0 [ 2206.355058] ? wait_for_completion_io+0x270/0x270 [ 2206.356052] ? __startup_64+0x7/0x3b0 [ 2206.356862] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2206.357940] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2206.358992] do_syscall_64+0x33/0x40 [ 2206.359749] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2206.360789] RIP: 0033:0x7fb9acc68b19 [ 2206.361545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2206.365258] RSP: 002b:00007fb9aa1de188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2206.366810] RAX: ffffffffffffffda RBX: 00007fb9acd7bf60 RCX: 00007fb9acc68b19 [ 2206.368243] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 2206.369705] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2206.371141] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2206.372589] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 [ 2206.384183] 9pnet: Insufficient options for proto=fd [ 2206.396381] EXT4-fs (sda): Unrecognized mount option "test_dummy_encr"ption" or missing value [ 2206.403116] 9pnet: Insufficient options for proto=fd [ 2206.424577] EXT4-fs (sda): Unrecognized mount option "test_dummy_encr"ption" or missing value 03:27:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:27:23 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2206.514828] FAULT_INJECTION: forcing a failure. [ 2206.514828] name failslab, interval 1, probability 0, space 0, times 0 [ 2206.518781] CPU: 1 PID: 30062 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2206.520211] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2206.521928] Call Trace: [ 2206.522477] dump_stack+0x107/0x167 [ 2206.523240] should_fail.cold+0x5/0xa [ 2206.524041] ? __iomap_dio_rw+0x1ee/0x11a0 [ 2206.524929] should_failslab+0x5/0x20 [ 2206.525716] kmem_cache_alloc_trace+0x55/0x360 [ 2206.526651] __iomap_dio_rw+0x1ee/0x11a0 [ 2206.527506] ? jbd2_journal_stop+0x188/0xe70 [ 2206.528397] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2206.529334] ? ext4_orphan_add+0x253/0x9e0 [ 2206.530213] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2206.531215] ? ext4_empty_dir+0xae0/0xae0 [ 2206.532048] ? jbd2__journal_start+0xf3/0x890 [ 2206.532974] iomap_dio_rw+0x31/0x90 [ 2206.533721] ext4_file_write_iter+0xb26/0x18e0 [ 2206.534674] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2206.535598] ? __lockdep_reset_lock+0x180/0x180 [ 2206.536547] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2206.537602] ? SOFTIRQ_verbose+0x10/0x10 [ 2206.538449] new_sync_write+0x42c/0x660 [ 2206.539253] ? new_sync_read+0x6f0/0x6f0 [ 2206.540080] ? ksys_write+0x12d/0x260 [ 2206.540860] ? lock_release+0x6b0/0x6b0 [ 2206.541689] ? selinux_file_permission+0x36/0x510 [ 2206.542724] ? __fget_files+0x296/0x480 [ 2206.543317] vfs_write+0x747/0xa30 [ 2206.543756] ksys_write+0x12d/0x260 [ 2206.544182] ? __ia32_sys_read+0xb0/0xb0 [ 2206.544684] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2206.545312] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2206.545964] do_syscall_64+0x33/0x40 [ 2206.546858] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2206.548083] RIP: 0033:0x7f06a9247b19 [ 2206.548980] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2206.553380] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2206.555206] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2206.556921] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2206.558330] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2206.559183] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2206.560040] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:27:23 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encr%ption']) 03:27:23 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80ffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:27:23 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 30) 03:27:23 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',,fdno=', @ANYRESHEX=r1]) [ 2206.601962] FAULT_INJECTION: forcing a failure. [ 2206.601962] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2206.603349] CPU: 1 PID: 30273 Comm: syz-executor.7 Not tainted 5.10.165 #1 [ 2206.604156] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2206.605116] Call Trace: [ 2206.605423] dump_stack+0x107/0x167 [ 2206.605865] should_fail.cold+0x5/0xa [ 2206.606318] _copy_to_user+0x2e/0x180 [ 2206.606759] simple_read_from_buffer+0xcc/0x160 [ 2206.607317] proc_fail_nth_read+0x198/0x230 [ 2206.607824] ? proc_sessionid_read+0x230/0x230 [ 2206.608372] ? security_file_permission+0x24e/0x570 [ 2206.608948] ? perf_trace_initcall_start+0x101/0x380 [ 2206.609560] ? proc_sessionid_read+0x230/0x230 [ 2206.610102] vfs_read+0x228/0x580 [ 2206.610523] ksys_read+0x12d/0x260 [ 2206.610944] ? vfs_write+0xa30/0xa30 [ 2206.611395] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2206.612005] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2206.612611] do_syscall_64+0x33/0x40 [ 2206.613062] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2206.613683] RIP: 0033:0x7fb9acc1b69c [ 2206.614127] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2206.616322] RSP: 002b:00007fb9aa1de170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2206.617233] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007fb9acc1b69c [ 2206.618095] RDX: 000000000000000f RSI: 00007fb9aa1de1e0 RDI: 0000000000000003 [ 2206.618952] RBP: 00007fb9aa1de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2206.619803] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2206.620650] R13: 00007ffc750c4acf R14: 00007fb9aa1de300 R15: 0000000000022000 03:27:23 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2206.647104] EXT4-fs (sda): Unrecognized mount option "test_dummy_encr%ption" or missing value [ 2206.651857] EXT4-fs (sda): Unrecognized mount option "test_dummy_encr%ption" or missing value 03:27:23 executing program 6: symlink(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='./file1/file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x4020, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 2206.705901] 9pnet: Insufficient options for proto=fd 03:27:23 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 16) 03:27:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:27:23 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:27:23 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encr,ption']) [ 2206.823819] FAULT_INJECTION: forcing a failure. [ 2206.823819] name failslab, interval 1, probability 0, space 0, times 0 [ 2206.825362] CPU: 1 PID: 30428 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2206.826144] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2206.827061] Call Trace: [ 2206.827357] dump_stack+0x107/0x167 [ 2206.827765] should_fail.cold+0x5/0xa [ 2206.828190] ? create_object.isra.0+0x3a/0xa20 [ 2206.828686] should_failslab+0x5/0x20 [ 2206.829098] kmem_cache_alloc+0x5b/0x360 [ 2206.829547] create_object.isra.0+0x3a/0xa20 [ 2206.830034] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2206.830588] kmem_cache_alloc_trace+0x151/0x360 [ 2206.831111] __iomap_dio_rw+0x1ee/0x11a0 [ 2206.831559] ? jbd2_journal_stop+0x188/0xe70 [ 2206.832040] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2206.832542] ? ext4_orphan_add+0x253/0x9e0 [ 2206.833018] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2206.833559] ? ext4_empty_dir+0xae0/0xae0 [ 2206.834015] ? jbd2__journal_start+0xf3/0x890 [ 2206.834510] iomap_dio_rw+0x31/0x90 [ 2206.834903] ext4_file_write_iter+0xb26/0x18e0 [ 2206.835415] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2206.835909] ? __lockdep_reset_lock+0x180/0x180 [ 2206.836413] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2206.836994] ? SOFTIRQ_verbose+0x10/0x10 [ 2206.837435] new_sync_write+0x42c/0x660 [ 2206.837878] ? new_sync_read+0x6f0/0x6f0 [ 2206.838340] ? ksys_write+0x12d/0x260 [ 2206.838755] ? lock_release+0x6b0/0x6b0 [ 2206.839189] ? selinux_file_permission+0x36/0x510 [ 2206.839720] ? __fget_files+0x296/0x480 [ 2206.840159] vfs_write+0x747/0xa30 [ 2206.840562] ksys_write+0x12d/0x260 [ 2206.840962] ? __ia32_sys_read+0xb0/0xb0 [ 2206.841402] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2206.841974] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2206.842526] do_syscall_64+0x33/0x40 [ 2206.842932] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2206.843478] RIP: 0033:0x7f06a9247b19 [ 2206.843877] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2206.844711] EXT4-fs (sda): Unrecognized mount option "test_dummy_encr" or missing value [ 2206.845823] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2206.845837] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2206.845843] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2206.845849] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2206.845855] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2206.845862] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 [ 2206.886828] EXT4-fs (sda): Unrecognized mount option "test_dummy_encr" or missing value 03:27:37 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encry\ntion']) 03:27:37 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:27:37 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:27:37 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:27:37 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:27:37 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b436751819982db, 0xa0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r0, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {0xe}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="7472c075000066642c72666431f8834b3e14442ace8a506f7ce1a1b1a990f0607dee911df74361d14c7c6181abfb4d19c9a232af40ddb5641c3f35ad110c3c319576c4105e55bed789a7fa47ef64a4c5526f4a7587e5b600819d2b25eb38f344058059ae00edbc859a13d1254dab6807b1d2f15eab325f85aba60b8b9e90c551b85bad790c76bbb135bb8a2d9a2072b6389eed8859c3cd8456e6e818438e1fcdb0e0fe3f204c18314ed2b8db9d366e97fdf1f4", @ANYRESHEX]) 03:27:37 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 17) 03:27:37 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',Ifdno=', @ANYRESHEX=r1]) [ 2220.953143] 9pnet: Insufficient options for proto=fd [ 2220.967354] 9pnet_virtio: no channels available for device 9p [ 2220.976603] EXT4-fs (sda): Unrecognized mount option "test_dummy_encry [ 2220.976603] tion" or missing value [ 2220.992809] EXT4-fs (sda): Unrecognized mount option "test_dummy_encry [ 2220.992809] tion" or missing value 03:27:38 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:27:38 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:27:38 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:27:38 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encry\"tion']) [ 2221.103884] FAULT_INJECTION: forcing a failure. [ 2221.103884] name failslab, interval 1, probability 0, space 0, times 0 [ 2221.107839] CPU: 0 PID: 30521 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2221.109237] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2221.110908] Call Trace: [ 2221.111456] dump_stack+0x107/0x167 [ 2221.112197] should_fail.cold+0x5/0xa [ 2221.112996] ? jbd2__journal_start+0x190/0x890 [ 2221.113933] should_failslab+0x5/0x20 [ 2221.114703] kmem_cache_alloc+0x5b/0x360 [ 2221.115545] jbd2__journal_start+0x190/0x890 [ 2221.116452] __ext4_journal_start_sb+0x214/0x430 [ 2221.117415] ext4_iomap_begin+0x485/0x700 [ 2221.118297] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2221.119284] ? iomap_dio_rw+0x31/0x90 [ 2221.120074] ? vfs_write+0x747/0xa30 [ 2221.120852] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2221.122134] ? lock_chain_count+0x20/0x20 [ 2221.122981] iomap_apply+0x164/0x9e0 [ 2221.123730] ? iomap_dio_rw+0x90/0x90 [ 2221.124497] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2221.125657] ? mark_held_locks+0x9e/0xe0 [ 2221.126511] ? filemap_check_errors+0xa5/0x150 [ 2221.127432] __iomap_dio_rw+0x6cd/0x11a0 [ 2221.128244] ? iomap_dio_rw+0x90/0x90 [ 2221.129030] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2221.129953] ? ext4_orphan_add+0x253/0x9e0 [ 2221.130815] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2221.131813] ? ext4_empty_dir+0xae0/0xae0 [ 2221.132660] ? jbd2__journal_start+0xf3/0x890 [ 2221.133584] iomap_dio_rw+0x31/0x90 [ 2221.134333] ext4_file_write_iter+0xb26/0x18e0 [ 2221.135293] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2221.136228] ? __lockdep_reset_lock+0x180/0x180 [ 2221.137181] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2221.138244] ? SOFTIRQ_verbose+0x10/0x10 [ 2221.139075] new_sync_write+0x42c/0x660 [ 2221.139896] ? new_sync_read+0x6f0/0x6f0 [ 2221.140724] ? ksys_write+0x12d/0x260 [ 2221.141514] ? lock_release+0x6b0/0x6b0 [ 2221.142349] ? selinux_file_permission+0x36/0x510 [ 2221.143342] ? __fget_files+0x296/0x480 [ 2221.144174] vfs_write+0x747/0xa30 [ 2221.144908] ksys_write+0x12d/0x260 [ 2221.145656] ? __ia32_sys_read+0xb0/0xb0 [ 2221.146486] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2221.147550] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2221.148591] do_syscall_64+0x33/0x40 [ 2221.149341] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2221.150373] RIP: 0033:0x7f06a9247b19 [ 2221.151121] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2221.154824] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2221.156377] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2221.157806] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2221.159254] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2221.160689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2221.162145] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:27:38 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:27:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181d30ad9, 0xb8) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) open_tree(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x80101) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="43b80cf6654c9f7c6fdadc5c965e89f911a555b6526fc00e7a2118798b016e24a0f73b9d433a3336f31f0da5b4bab7705d61b0b83e9e5b38a85ab745ea39a0c4de740135d4", @ANYRESHEX=r1, @ANYRESDEC=r1, @ANYRES64]) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x80000000) [ 2221.463025] EXT4-fs (sda): Unrecognized mount option "test_dummy_encry"tion" or missing value [ 2221.470243] EXT4-fs (sda): Unrecognized mount option "test_dummy_encry"tion" or missing value 03:27:53 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {0x1f}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:27:53 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',Qfdno=', @ANYRESHEX=r1]) 03:27:53 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:27:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encry#tion']) 03:27:53 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:27:53 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 18) 03:27:53 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:27:53 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2236.047668] 9pnet: Insufficient options for proto=fd [ 2236.049359] EXT4-fs (sda): Unrecognized mount option "test_dummy_encry#tion" or missing value [ 2236.082626] EXT4-fs (sda): Unrecognized mount option "test_dummy_encry#tion" or missing value 03:27:53 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2236.140858] FAULT_INJECTION: forcing a failure. [ 2236.140858] name failslab, interval 1, probability 0, space 0, times 0 [ 2236.144616] CPU: 0 PID: 30853 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2236.146071] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2236.147786] Call Trace: [ 2236.148344] dump_stack+0x107/0x167 [ 2236.149102] should_fail.cold+0x5/0xa [ 2236.149889] ? create_object.isra.0+0x3a/0xa20 [ 2236.150846] should_failslab+0x5/0x20 [ 2236.151636] kmem_cache_alloc+0x5b/0x360 [ 2236.152489] create_object.isra.0+0x3a/0xa20 [ 2236.153387] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2236.154443] kmem_cache_alloc+0x159/0x360 [ 2236.155311] jbd2__journal_start+0x190/0x890 [ 2236.156222] __ext4_journal_start_sb+0x214/0x430 [ 2236.157221] ext4_iomap_begin+0x485/0x700 [ 2236.158119] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2236.159142] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2236.160276] iomap_apply+0x164/0x9e0 [ 2236.161047] ? iomap_dio_rw+0x90/0x90 [ 2236.161826] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2236.163036] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2236.164128] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2236.165239] ? trace_hardirqs_on+0x5b/0x180 [ 2236.166180] __iomap_dio_rw+0x6cd/0x11a0 [ 2236.167011] ? iomap_dio_rw+0x90/0x90 [ 2236.167820] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2236.168755] ? ext4_orphan_add+0x253/0x9e0 [ 2236.169625] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2236.170639] ? ext4_empty_dir+0xae0/0xae0 [ 2236.171484] ? jbd2__journal_start+0xf3/0x890 [ 2236.172430] iomap_dio_rw+0x31/0x90 [ 2236.173172] ext4_file_write_iter+0xb26/0x18e0 [ 2236.174144] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2236.175082] ? __lockdep_reset_lock+0x180/0x180 [ 2236.176047] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2236.177130] ? SOFTIRQ_verbose+0x10/0x10 [ 2236.177974] new_sync_write+0x42c/0x660 [ 2236.178804] ? new_sync_read+0x6f0/0x6f0 [ 2236.179659] ? ksys_write+0x12d/0x260 [ 2236.180445] ? lock_release+0x6b0/0x6b0 [ 2236.181265] ? selinux_file_permission+0x36/0x510 [ 2236.182270] ? __fget_files+0x296/0x480 [ 2236.183111] vfs_write+0x747/0xa30 [ 2236.183857] ksys_write+0x12d/0x260 [ 2236.184606] ? __ia32_sys_read+0xb0/0xb0 [ 2236.185456] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2236.186556] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2236.187635] do_syscall_64+0x33/0x40 [ 2236.188411] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2236.189481] RIP: 0033:0x7f06a9247b19 [ 2236.190265] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2236.194064] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2236.195641] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2236.197125] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2236.198606] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2236.200093] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2236.201562] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:27:53 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',Rfdno=', @ANYRESHEX=r1]) [ 2236.227476] 9pnet: Insufficient options for proto=fd 03:27:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') r2 = fsopen(&(0x7f0000001100)='omfs\x00', 0x0) dup2(r2, r0) pread64(r1, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) pread64(r0, &(0x7f0000001080)=""/93, 0x5d, 0x4) r3 = openat(r1, &(0x7f0000000080)='./file1\x00', 0x3, 0x1d4) clone3(&(0x7f00000008c0)={0x121044000, 0x0, 0x0, 0x0, {0xfffffffd}, 0x0, 0x0, 0x0, 0x0}, 0x6) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_aout(r3, &(0x7f00000011c0)={{0x0, 0x5, 0x0, 0x220, 0x152, 0x80000001, 0x165, 0x3}, "69039b1894a89cb279274edae51d1c8d3740d3b094a4c862fa86f0c102e83b1e9e778d1692a6944e4f0baaaa46d0153aa103eacb0b318736cd8d09558547b1ac015093535b82bd5f9ffa91edfee379babae8bea2a765f968baf73fa111c97d06b0940e7e1b89cdd081d0354fa855fbe2ea610e2312125d86ec919eb6363755fed592574ddabbfc8f8312991873ceb9e4fd069125e4bab58038c62494cf8baebba5acd7f81ea18a6fcbe26fe56b156b7bf3cf59c1a7ff4a151d94c6a0b417476d716d807e20e6f9b73d5088e7a9de392ef0f7d2e50d", ['\x00']}, 0x1f5) setsockopt$inet6_group_source_req(r5, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) mount$9p_fd(0x20000000, &(0x7f0000001140)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000001180)=ANY=[@ANYRESHEX=r5, @ANYRESHEX]) 03:27:53 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:27:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encry%tion']) [ 2236.311330] 9pnet_virtio: no channels available for device 9p [ 2236.321605] EXT4-fs (sda): Unrecognized mount option "test_dummy_encry%tion" or missing value [ 2236.331004] EXT4-fs (sda): Unrecognized mount option "test_dummy_encry%tion" or missing value 03:28:08 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 19) 03:28:08 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x2b4367518191cdd8, 0x1) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r0, 0xf501, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r1, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) sendmsg$nl_generic(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x158, 0x23, 0x9e2331a5228ca68b, 0x70bd2d, 0x25dfdbfb, {0xe}, [@generic="6bbec85c38f7cd03f58f982ac6eead0e243a62ade61632fa52544e0482f1c72458a4be6a7dffaf22dcb8bd35531d29a6c1af575eac161a66a6305b197d2f799dcf996aeadd71b74bdd25c82955cd983c6f0832e99a80599db3b431d3eb36cdd0c2f2759b6bfaee06baf7cfb8ef3bae94f95c14033ba57f298c699e2bccbea69e414d5dff55891e2dac9ea2ab48ab35cc1306edcbba2db35ca9f539134adc19fa269b14a4e84098a21780131ee533b21817c212b9587a9a6fa9c2cdca1c615beb6e36e5c4a80d2bc7a66ea7aca18b02803ba90ac19149ea117ec7b94af810c906d0991c157bc14b54f3575a3eb6075d0ff6122a87", @nested={0xc, 0x53, 0x0, 0x1, [@typed={0x8, 0x2f, 0x0, 0x0, @u32=0x1}, @generic]}, @generic="a651173b52b507529a49bf8ffee920303c7a8eeae044a64d35dfa342075afc91b16cfde08ce2a04624320e2d04918b4c5ea906aabce1a92f1873af5b2206b462d1723e"]}, 0x158}, 0x1, 0x0, 0x0, 0x100}, 0x4) r2 = openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) write(r2, &(0x7f00000003c0)="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", 0xfffffffffffffc40) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:28:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',Sfdno=', @ANYRESHEX=r1]) 03:28:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:28:08 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:28:08 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:28:08 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encry*tion']) 03:28:08 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2251.571538] 9pnet: Insufficient options for proto=fd [ 2251.592513] EXT4-fs (sda): Unrecognized mount option "test_dummy_encry*tion" or missing value [ 2251.597399] EXT4-fs (sda): Unrecognized mount option "test_dummy_encry*tion" or missing value 03:28:08 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:28:08 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:28:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4b9b7e814010000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:28:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',Tfdno=', @ANYRESHEX=r1]) 03:28:08 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2251.706858] FAULT_INJECTION: forcing a failure. [ 2251.706858] name failslab, interval 1, probability 0, space 0, times 0 [ 2251.709873] CPU: 0 PID: 31190 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2251.711310] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2251.713018] Call Trace: [ 2251.713569] dump_stack+0x107/0x167 [ 2251.714326] should_fail.cold+0x5/0xa [ 2251.715124] ? jbd2__journal_start+0x190/0x890 [ 2251.716061] should_failslab+0x5/0x20 [ 2251.716843] kmem_cache_alloc+0x5b/0x360 [ 2251.717686] jbd2__journal_start+0x190/0x890 [ 2251.718606] __ext4_journal_start_sb+0x214/0x430 [ 2251.719578] ext4_file_write_iter+0x114b/0x18e0 [ 2251.720541] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2251.721474] ? __lockdep_reset_lock+0x180/0x180 [ 2251.722437] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2251.723505] ? SOFTIRQ_verbose+0x10/0x10 [ 2251.724345] new_sync_write+0x42c/0x660 [ 2251.725161] ? new_sync_read+0x6f0/0x6f0 [ 2251.726007] ? ksys_write+0x12d/0x260 [ 2251.726799] ? lock_release+0x6b0/0x6b0 [ 2251.727628] ? selinux_file_permission+0x36/0x510 [ 2251.728611] ? __fget_files+0x296/0x480 [ 2251.729439] vfs_write+0x747/0xa30 [ 2251.730175] ksys_write+0x12d/0x260 [ 2251.730935] ? __ia32_sys_read+0xb0/0xb0 [ 2251.731770] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2251.732810] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2251.733858] do_syscall_64+0x33/0x40 [ 2251.734605] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2251.735649] RIP: 0033:0x7f06a9247b19 [ 2251.736391] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2251.740138] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2251.741668] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2251.743130] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2251.744751] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2251.746394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2251.748017] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:28:08 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:28:08 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encry+tion']) [ 2251.798571] 9pnet: Insufficient options for proto=fd [ 2251.830878] EXT4-fs (sda): Unrecognized mount option "test_dummy_encry+tion" or missing value [ 2251.837294] EXT4-fs (sda): Unrecognized mount option "test_dummy_encry+tion" or missing value 03:28:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',Vfdno=', @ANYRESHEX=r1]) 03:28:26 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:28:26 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 20) 03:28:26 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:28:26 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:28:26 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x13, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:28:26 executing program 6: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/30) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x9, 0x1, 0xef, 0xff, 0x0, 0xbb87, 0x2000, 0xc, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8001, 0x2, @perf_config_ext={0x1}, 0x1, 0xffffffff, 0x2c48000, 0x0, 0x8, 0x4, 0x0, 0x0, 0xffffffff, 0x0, 0x1}, r2, 0xa, r0, 0x2) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX=r1]) 03:28:26 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encry,tion']) [ 2269.074066] 9pnet: Insufficient options for proto=fd [ 2269.079609] 9pnet: Insufficient options for proto=fd [ 2269.087540] EXT4-fs (sda): Unrecognized mount option "test_dummy_encry" or missing value [ 2269.105379] EXT4-fs (sda): Unrecognized mount option "test_dummy_encry" or missing value 03:28:26 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x14, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:28:26 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:28:26 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:28:26 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encry-tion']) [ 2269.236306] FAULT_INJECTION: forcing a failure. [ 2269.236306] name failslab, interval 1, probability 0, space 0, times 0 [ 2269.239890] CPU: 1 PID: 31542 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2269.241311] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2269.243024] Call Trace: [ 2269.243574] dump_stack+0x107/0x167 [ 2269.244329] should_fail.cold+0x5/0xa [ 2269.245117] ? create_object.isra.0+0x3a/0xa20 [ 2269.246072] should_failslab+0x5/0x20 [ 2269.246879] kmem_cache_alloc+0x5b/0x360 [ 2269.247724] create_object.isra.0+0x3a/0xa20 [ 2269.248626] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2269.249670] kmem_cache_alloc+0x159/0x360 [ 2269.250527] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2269.251608] jbd2__journal_start+0x190/0x890 [ 2269.252517] __ext4_journal_start_sb+0x214/0x430 [ 2269.253493] ext4_file_write_iter+0x114b/0x18e0 [ 2269.254465] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2269.255421] ? __lockdep_reset_lock+0x180/0x180 [ 2269.256378] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2269.257446] ? SOFTIRQ_verbose+0x10/0x10 [ 2269.258289] new_sync_write+0x42c/0x660 [ 2269.259113] ? new_sync_read+0x6f0/0x6f0 [ 2269.259946] ? ksys_write+0x12d/0x260 [ 2269.260736] ? lock_release+0x6b0/0x6b0 [ 2269.261552] ? selinux_file_permission+0x36/0x510 [ 2269.262552] ? __fget_files+0x296/0x480 [ 2269.263388] vfs_write+0x747/0xa30 [ 2269.264138] ksys_write+0x12d/0x260 [ 2269.264892] ? __ia32_sys_read+0xb0/0xb0 [ 2269.265729] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2269.266821] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2269.267880] do_syscall_64+0x33/0x40 [ 2269.268644] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2269.269691] RIP: 0033:0x7f06a9247b19 [ 2269.270455] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2269.274211] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2269.275776] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2269.277235] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2269.278704] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2269.280159] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2269.281617] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:28:26 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r0, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) r1 = open$dir(&(0x7f0000001080)='./file1\x00', 0x20002, 0x6) dup3(r0, r1, 0x0) write$selinux_attr(r0, &(0x7f00000000c0)='system_u:object_r:qemu_device_t:s0\x00', 0x23) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x40, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:28:26 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2269.337717] EXT4-fs (sda): Unrecognized mount option "test_dummy_encry-tion" or missing value 03:28:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',bfdno=', @ANYRESHEX=r1]) [ 2269.356906] EXT4-fs (sda): Unrecognized mount option "test_dummy_encry-tion" or missing value 03:28:26 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2269.421607] 9pnet: Insufficient options for proto=fd [ 2269.432528] 9pnet: Insufficient options for proto=fd 03:28:26 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:28:26 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x25, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:28:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',dfdno=', @ANYRESHEX=r1]) 03:28:44 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:28:44 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encry.tion']) 03:28:44 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:28:44 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:28:44 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x2, &(0x7f0000000200)=ANY=[@ANYRES64, @ANYRESHEX]) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r1, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) mount$9p_fd(0x0, &(0x7f0000001140)='./file1\x00', &(0x7f0000001180), 0x10, &(0x7f00000011c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client}, {@access_user}, {@version_9p2000}, {@version_u}, {@uname={'uname', 0x3d, '}\n\x14\x00'}}, {@cachetag={'cachetag', 0x3d, 'net/mcfilter6\x00'}}, {@cache_loose}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'user_u'}}]}}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r2, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f0000000240)={{0x0, 0xff}, 0x100, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000001080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01}}, './file1\x00'}) ioctl$TCSETSW(r3, 0x5403, &(0x7f00000010c0)={0x7ec8, 0x10001, 0x9, 0x3, 0xc, "ebc1dcd289fe6415d6ae1e58e86dfda7afbbf3"}) close(r2) openat(r2, &(0x7f0000001100)='./file1\x00', 0x8000, 0x1c2) 03:28:44 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 21) 03:28:44 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x111, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2287.184059] 9pnet: Insufficient options for proto=fd [ 2287.194011] 9pnet_virtio: no channels available for device 9p [ 2287.212570] EXT4-fs (sda): Unrecognized mount option "test_dummy_encry.tion" or missing value [ 2287.220200] 9pnet: Insufficient options for proto=fd [ 2287.225306] EXT4-fs (sda): Unrecognized mount option "test_dummy_encry.tion" or missing value 03:28:44 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x77, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:28:44 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:28:44 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:28:44 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encry0tion']) 03:28:44 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xc00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:28:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',gfdno=', @ANYRESHEX=r1]) [ 2287.419848] EXT4-fs (sda): Unrecognized mount option "test_dummy_encry0tion" or missing value [ 2287.423925] FAULT_INJECTION: forcing a failure. [ 2287.423925] name failslab, interval 1, probability 0, space 0, times 0 [ 2287.426788] CPU: 0 PID: 32093 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2287.428297] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2287.430036] Call Trace: [ 2287.430601] dump_stack+0x107/0x167 [ 2287.431366] should_fail.cold+0x5/0xa [ 2287.432176] ? jbd2__journal_start+0x190/0x890 [ 2287.433120] should_failslab+0x5/0x20 [ 2287.433892] kmem_cache_alloc+0x5b/0x360 [ 2287.434732] jbd2__journal_start+0x190/0x890 [ 2287.435632] __ext4_journal_start_sb+0x214/0x430 [ 2287.436614] ext4_truncate+0x665/0x12b0 [ 2287.437434] ? ext4_punch_hole+0x1110/0x1110 [ 2287.438330] ? down_write_killable+0x180/0x180 [ 2287.439280] ext4_file_write_iter+0x13a5/0x18e0 [ 2287.440236] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2287.441163] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2287.442219] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2287.443316] ? trace_hardirqs_on+0x5b/0x180 [ 2287.444213] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2287.445331] new_sync_write+0x42c/0x660 [ 2287.446142] ? new_sync_read+0x6f0/0x6f0 [ 2287.446980] ? lock_release+0x6b0/0x6b0 [ 2287.447783] ? selinux_file_permission+0x36/0x510 [ 2287.448784] vfs_write+0x747/0xa30 [ 2287.449517] ksys_write+0x12d/0x260 [ 2287.450249] ? __ia32_sys_read+0xb0/0xb0 [ 2287.451101] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2287.452143] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2287.453157] do_syscall_64+0x33/0x40 [ 2287.453888] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2287.454904] RIP: 0033:0x7f06a9247b19 [ 2287.455635] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2287.459219] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2287.460702] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2287.462084] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2287.463024] 9pnet: Insufficient options for proto=fd [ 2287.463495] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2287.463547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2287.467316] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 [ 2287.493731] EXT4-fs (sda): Unrecognized mount option "test_dummy_encry0tion" or missing value 03:28:44 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:28:44 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:00 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 22) 03:29:00 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryXtion']) 03:29:00 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:00 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1e01000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:00 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:00 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x111, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:00 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',qfdno=', @ANYRESHEX=r1]) 03:29:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x10) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000001240)=ANY=[@ANYBLOB="c30000000000000000000000362d4a69236e91684f04b3b2ba301c9652d936e1fa919a7b2dc1575f94934b64b0f417a839db3511af4d1c0c517fff33e35a5938b948710dbfcedb555c3bd42b6d17e882114a", @ANYRES32=r0, @ANYBLOB="ff0f0000000000002e276e696c67350084bffad5ee7cfc64416040e75198b0e040876261e62525f3f4e8256d7b2431e5e64e3d2381cd9a6b7ef22d86c3"]) openat$cgroup(r2, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r0, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) pread64(0xffffffffffffffff, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) openat(0xffffffffffffffff, &(0x7f0000001940)='./file1\x00', 0x101000, 0x82) openat(r3, &(0x7f0000000500)='./file1\x00', 0x400001, 0x80) r4 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x0, 0x1) connect$inet6(r2, &(0x7f00000001c0)={0xa, 0x4e22, 0xff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xd43}, 0x1c) r5 = getpid() prlimit64(r1, 0x6, &(0x7f0000001100)={0x6, 0x7}, &(0x7f00000000c0)) r6 = getpid() prlimit64(r6, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) clone3(&(0x7f0000000400)={0x200000000, &(0x7f00000010c0), &(0x7f0000000300), &(0x7f0000000340), {0x12}, &(0x7f00000029c0)=""/4110, 0x100e, &(0x7f0000000380)=""/43, &(0x7f00000003c0)=[r5, 0x0, r1, r6, r1], 0x5, {r4}}, 0x58) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000480), 0x2000, 0x0) connect$inet6(r4, &(0x7f0000001140)={0xa, 0x4e21, 0xfffffffd, @mcast2, 0x1f}, 0x1c) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000001080), 0x0, &(0x7f0000000000)=ANY=[@ANYRES32=r1, @ANYRES32]) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) [ 2303.249197] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryXtion" or missing value [ 2303.263307] 9pnet: Insufficient options for proto=fd [ 2303.276776] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryXtion" or missing value [ 2303.280763] 9pnet_virtio: no channels available for device ÿÿÿÿÿÿÿÿ 03:29:00 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:00 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:00 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:00 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryction']) 03:29:00 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2303.508768] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryction" or missing value [ 2303.529583] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryction" or missing value [ 2303.531705] FAULT_INJECTION: forcing a failure. [ 2303.531705] name failslab, interval 1, probability 0, space 0, times 0 [ 2303.534343] CPU: 0 PID: 32434 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2303.535726] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2303.537367] Call Trace: [ 2303.537907] dump_stack+0x107/0x167 [ 2303.538637] should_fail.cold+0x5/0xa [ 2303.539415] ? create_object.isra.0+0x3a/0xa20 [ 2303.540345] should_failslab+0x5/0x20 [ 2303.541108] kmem_cache_alloc+0x5b/0x360 [ 2303.541916] ? truncate_inode_page+0xd0/0xd0 [ 2303.542811] create_object.isra.0+0x3a/0xa20 [ 2303.543712] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2303.544740] kmem_cache_alloc+0x159/0x360 [ 2303.545594] jbd2__journal_start+0x190/0x890 [ 2303.546497] __ext4_journal_start_sb+0x214/0x430 [ 2303.547475] ext4_truncate+0x665/0x12b0 [ 2303.548298] ? ext4_punch_hole+0x1110/0x1110 [ 2303.549179] ? down_write_killable+0x180/0x180 [ 2303.550108] ext4_file_write_iter+0x13a5/0x18e0 [ 2303.551078] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2303.551999] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2303.552930] new_sync_write+0x42c/0x660 [ 2303.553720] ? new_sync_read+0x6f0/0x6f0 [ 2303.554554] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2303.555664] ? vfs_write+0x6b1/0xa30 [ 2303.556427] vfs_write+0x747/0xa30 [ 2303.557155] ksys_write+0x12d/0x260 [ 2303.557889] ? __ia32_sys_read+0xb0/0xb0 [ 2303.558717] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2303.559809] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2303.560837] do_syscall_64+0x33/0x40 [ 2303.561594] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2303.562615] RIP: 0033:0x7f06a9247b19 [ 2303.563371] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2303.567057] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2303.568582] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2303.570001] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 03:29:00 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',sfdno=', @ANYRESHEX=r1]) [ 2303.571445] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2303.573034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2303.574458] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 [ 2303.592631] 9pnet: Insufficient options for proto=fd 03:29:00 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:00 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = epoll_create1(0x80000) close_range(r0, r2, 0x2) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="7472616e8c3d66642c726664", @ANYRESHEX]) r3 = getpid() prlimit64(r3, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) r4 = getpid() prlimit64(r4, 0x0, &(0x7f0000000000), 0x0) r5 = getpid() prlimit64(r5, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) r6 = getpid() prlimit64(r6, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) r7 = getpid() prlimit64(r7, 0x0, &(0x7f0000000000), 0x0) clone3(&(0x7f0000000340)={0x48800000, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0x14}, &(0x7f0000000180)=""/63, 0x3f, &(0x7f0000000240)=""/209, &(0x7f00000001c0)=[r3, r1, r4, r1, r5, r1, r6, r7], 0x8, {r0}}, 0x58) 03:29:14 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encrydtion']) 03:29:14 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:14 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 23) [ 2317.459502] 9pnet: Insufficient options for proto=fd 03:29:14 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',ufdno=', @ANYRESHEX=r1]) 03:29:14 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:14 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2317.488209] EXT4-fs (sda): Unrecognized mount option "test_dummy_encrydtion" or missing value [ 2317.496427] 9pnet_virtio: no channels available for device 9p [ 2317.507265] EXT4-fs (sda): Unrecognized mount option "test_dummy_encrydtion" or missing value 03:29:14 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:14 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:14 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryition']) [ 2317.667450] FAULT_INJECTION: forcing a failure. [ 2317.667450] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 2317.671866] CPU: 1 PID: 32779 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2317.673253] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2317.674900] Call Trace: [ 2317.675459] dump_stack+0x107/0x167 [ 2317.676194] should_fail.cold+0x5/0xa [ 2317.676985] __alloc_pages_nodemask+0x182/0x680 [ 2317.677923] ? xas_start+0x156/0x530 [ 2317.678682] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 2317.679903] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2317.680953] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2317.682033] ? trace_hardirqs_on+0x5b/0x180 [ 2317.682900] alloc_pages_current+0x187/0x280 [ 2317.683794] __page_cache_alloc+0x2d2/0x360 [ 2317.684657] ? pagecache_get_page+0x2c0/0xc80 [ 2317.685600] pagecache_get_page+0x2c7/0xc80 [ 2317.686512] ? jbd2__journal_start+0xf3/0x890 [ 2317.687456] __ext4_block_zero_page_range+0x97/0x940 [ 2317.688501] ? __ext4_journal_start_sb+0x214/0x430 [ 2317.689514] ext4_truncate+0xede/0x12b0 [ 2317.690347] ? ext4_punch_hole+0x1110/0x1110 [ 2317.691258] ? down_write_killable+0x180/0x180 [ 2317.692212] ext4_file_write_iter+0x13a5/0x18e0 [ 2317.693189] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2317.694137] ? new_sync_write+0xce/0x660 [ 2317.694832] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryition" or missing value [ 2317.694978] new_sync_write+0x42c/0x660 [ 2317.697596] ? new_sync_read+0x6f0/0x6f0 [ 2317.698432] ? ksys_write+0x12d/0x260 [ 2317.699230] ? lock_release+0x6b0/0x6b0 [ 2317.700051] ? selinux_file_permission+0x36/0x510 [ 2317.701042] ? __fget_files+0x296/0x480 [ 2317.701871] vfs_write+0x747/0xa30 [ 2317.702610] ksys_write+0x12d/0x260 [ 2317.703361] ? __ia32_sys_read+0xb0/0xb0 [ 2317.704196] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2317.705267] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2317.706325] do_syscall_64+0x33/0x40 [ 2317.707101] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2317.708205] RIP: 0033:0x7f06a9247b19 [ 2317.708977] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2317.712832] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2317.714400] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2317.715874] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2317.717345] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2317.718810] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2317.720278] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 [ 2317.734892] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryition" or missing value 03:29:14 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:14 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',w\"dno=', @ANYRESHEX=r1]) 03:29:14 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xf5ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2317.843839] 9pnet: Insufficient options for proto=fd 03:29:29 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 24) 03:29:29 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryltion']) 03:29:29 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',w,dno=', @ANYRESHEX=r1]) 03:29:29 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:29 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r0, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x8, 0x2) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:29:29 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xf903000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:29 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:29 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x6, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2332.540238] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryltion" or missing value 03:29:29 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2332.554616] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryltion" or missing value [ 2332.567143] 9pnet: Insufficient options for proto=fd [ 2332.578960] FAULT_INJECTION: forcing a failure. [ 2332.578960] name failslab, interval 1, probability 0, space 0, times 0 [ 2332.580552] CPU: 0 PID: 33028 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2332.581385] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2332.582415] Call Trace: [ 2332.582743] dump_stack+0x107/0x167 [ 2332.583204] should_fail.cold+0x5/0xa [ 2332.583708] ? xas_alloc+0x336/0x440 [ 2332.584157] should_failslab+0x5/0x20 [ 2332.584637] kmem_cache_alloc+0x5b/0x360 [ 2332.585129] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2332.585791] xas_alloc+0x336/0x440 [ 2332.586220] xas_create+0x35f/0x1040 [ 2332.586709] xas_store+0x90/0x1c40 [ 2332.587137] ? xas_find_conflict+0x4a6/0x9f0 [ 2332.587702] __add_to_page_cache_locked+0x708/0xcf0 [ 2332.588305] ? file_write_and_wait_range+0x130/0x130 [ 2332.588939] ? memcg_drain_all_list_lrus+0x6d0/0x6d0 [ 2332.589543] ? find_get_entry+0x2d9/0x6e0 [ 2332.590061] add_to_page_cache_lru+0xe6/0x2e0 [ 2332.590591] ? add_to_page_cache_locked+0x40/0x40 [ 2332.591190] ? __page_cache_alloc+0x10d/0x360 [ 2332.591734] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2332.592327] pagecache_get_page+0x38b/0xc80 [ 2332.592859] ? jbd2__journal_start+0xf3/0x890 [ 2332.593417] __ext4_block_zero_page_range+0x97/0x940 [ 2332.594028] ? __ext4_journal_start_sb+0x214/0x430 [ 2332.594636] ext4_truncate+0xede/0x12b0 [ 2332.595122] ? ext4_punch_hole+0x1110/0x1110 [ 2332.595676] ? down_write_killable+0x180/0x180 [ 2332.596239] ext4_file_write_iter+0x13a5/0x18e0 [ 2332.596819] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2332.597386] ? new_sync_write+0x132/0x660 [ 2332.597901] new_sync_write+0x42c/0x660 [ 2332.598392] ? new_sync_read+0x6f0/0x6f0 [ 2332.598890] ? ksys_write+0x12d/0x260 [ 2332.599364] ? lock_release+0x6b0/0x6b0 [ 2332.599852] ? selinux_file_permission+0x36/0x510 [ 2332.600447] ? __fget_files+0x296/0x480 [ 2332.600943] vfs_write+0x747/0xa30 [ 2332.601385] ksys_write+0x12d/0x260 [ 2332.601840] ? __ia32_sys_read+0xb0/0xb0 [ 2332.602334] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2332.602982] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2332.603630] do_syscall_64+0x33/0x40 [ 2332.604085] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2332.604693] RIP: 0033:0x7f06a9247b19 [ 2332.605153] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2332.607304] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2332.608245] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2332.609112] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2332.609980] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2332.610860] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2332.611744] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:29:29 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:29 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:29 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0xc, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:29 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryotion']) 03:29:29 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfeffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:29 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2332.757609] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryotion" or missing value [ 2332.777244] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryotion" or missing value 03:29:44 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:44 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:44 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encrystion']) 03:29:44 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$addseals(r0, 0x409, 0x6d92e45cd82d7fa1) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d97e92c7266854d547612da499ce4abf00808be57f5a0c049382f8ea267729825f8e26757d396f47667dcb5109c53770b3d1541ff1654a8c25992400aecd1b0beb5e37f1ce295e59ce1d0321eea07e66b9af84e0b4867894f6df76817ffd57956b930276d828a25c3eada2bf4a84a0600000000000000289b335e6586560e09bb591371824431c7c1eb19c0476537a15eab36b0cdc9de4002422fe7575084a38058ff71c5f30ae01444e5f65ddda940d0488b1e8e5867ec455cd1aaee7d837c9ae67c9b5f37d8f30962b46d2f4b87f91eaef145aac655f8bc3cd6d05446162d8b", @ANYRESHEX]) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x141080, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) dup2(r2, r3) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000000c0)=0x4) 03:29:44 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 25) 03:29:44 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:44 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',w.dno=', @ANYRESHEX=r1]) [ 2347.599146] 9pnet: Could not find request transport: —é 03:29:44 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2347.632281] EXT4-fs (sda): Unrecognized mount option "test_dummy_encrystion" or missing value 03:29:44 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2347.636636] 9pnet: Insufficient options for proto=fd [ 2347.648864] EXT4-fs (sda): Unrecognized mount option "test_dummy_encrystion" or missing value 03:29:44 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11e, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:44 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:44 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:44 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryution']) 03:29:44 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:44 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x8, &(0x7f0000000180)=ANY=[@ANYRES16=r2, @ANYRESHEX=r1, @ANYRESDEC=r3]) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r0, 0x40049366, &(0x7f0000000080)=0x2) [ 2347.788071] 9pnet_virtio: no channels available for device [ 2347.788486] FAULT_INJECTION: forcing a failure. [ 2347.788486] name failslab, interval 1, probability 0, space 0, times 0 [ 2347.791054] CPU: 1 PID: 33270 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2347.792480] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2347.794185] Call Trace: [ 2347.794742] dump_stack+0x107/0x167 [ 2347.795492] should_fail.cold+0x5/0xa [ 2347.796293] ? create_object.isra.0+0x3a/0xa20 [ 2347.797231] should_failslab+0x5/0x20 [ 2347.798020] kmem_cache_alloc+0x5b/0x360 [ 2347.798859] create_object.isra.0+0x3a/0xa20 [ 2347.799757] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2347.800800] kmem_cache_alloc+0x159/0x360 [ 2347.801649] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2347.802725] xas_alloc+0x336/0x440 [ 2347.803457] xas_create+0x35f/0x1040 [ 2347.804262] xas_store+0x90/0x1c40 [ 2347.805001] ? xas_find_conflict+0x4a6/0x9f0 [ 2347.805913] __add_to_page_cache_locked+0x708/0xcf0 [ 2347.806937] ? file_write_and_wait_range+0x130/0x130 [ 2347.807968] ? memcg_drain_all_list_lrus+0x6d0/0x6d0 [ 2347.808970] ? find_get_entry+0x2d9/0x6e0 [ 2347.809804] add_to_page_cache_lru+0xe6/0x2e0 [ 2347.810702] ? add_to_page_cache_locked+0x40/0x40 [ 2347.811666] ? __page_cache_alloc+0x10d/0x360 [ 2347.812551] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2347.813518] pagecache_get_page+0x38b/0xc80 [ 2347.814378] ? jbd2__journal_start+0xf3/0x890 [ 2347.815273] __ext4_block_zero_page_range+0x97/0x940 [ 2347.816308] ? __ext4_journal_start_sb+0x214/0x430 [ 2347.817300] ext4_truncate+0xede/0x12b0 [ 2347.818101] ? ext4_punch_hole+0x1110/0x1110 [ 2347.818969] ? down_write_killable+0x180/0x180 [ 2347.819894] ext4_file_write_iter+0x13a5/0x18e0 [ 2347.820850] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2347.821806] ? __lockdep_reset_lock+0x180/0x180 [ 2347.822876] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2347.824092] ? SOFTIRQ_verbose+0x10/0x10 [ 2347.825038] new_sync_write+0x42c/0x660 [ 2347.825955] ? new_sync_read+0x6f0/0x6f0 [ 2347.826890] ? ksys_write+0x12d/0x260 [ 2347.827773] ? lock_release+0x6b0/0x6b0 [ 2347.828689] ? selinux_file_permission+0x36/0x510 [ 2347.829799] ? __fget_files+0x296/0x480 [ 2347.830729] vfs_write+0x747/0xa30 [ 2347.831577] ksys_write+0x12d/0x260 [ 2347.832407] ? __ia32_sys_read+0xb0/0xb0 [ 2347.833342] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2347.834524] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2347.835705] do_syscall_64+0x33/0x40 [ 2347.836546] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2347.837705] RIP: 0033:0x7f06a9247b19 [ 2347.838541] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2347.842724] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2347.844437] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2347.846026] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2347.847641] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2347.849228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2347.850819] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:29:44 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2347.889610] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryution" or missing value [ 2347.894768] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryution" or missing value 03:29:59 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:59 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 26) 03:29:59 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryxtion']) 03:29:59 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r0, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x14, &(0x7f0000000200)=ANY=[@ANYRES64=r0, @ANYRESHEX]) 03:29:59 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:59 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:59 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',w/dno=', @ANYRESHEX=r1]) 03:29:59 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f9, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2362.404158] 9pnet: Insufficient options for proto=fd [ 2362.412128] 9pnet_virtio: no channels available for device 9p [ 2362.414768] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryxtion" or missing value [ 2362.428633] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryxtion" or missing value 03:29:59 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:59 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:59 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:59 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryp\nion']) 03:29:59 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wf\"no=', @ANYRESHEX=r1]) 03:29:59 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:29:59 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11e, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2362.544465] FAULT_INJECTION: forcing a failure. [ 2362.544465] name failslab, interval 1, probability 0, space 0, times 0 [ 2362.547029] CPU: 1 PID: 33617 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2362.548617] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2362.550514] Call Trace: [ 2362.551141] dump_stack+0x107/0x167 [ 2362.551997] should_fail.cold+0x5/0xa [ 2362.552881] ? xas_alloc+0x336/0x440 [ 2362.553741] should_failslab+0x5/0x20 [ 2362.554624] kmem_cache_alloc+0x5b/0x360 [ 2362.555556] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2362.556706] 9pnet: Insufficient options for proto=fd [ 2362.556772] xas_alloc+0x336/0x440 [ 2362.558134] xas_create+0x35f/0x1040 [ 2362.559014] xas_store+0x90/0x1c40 [ 2362.559834] ? xas_find_conflict+0x4a6/0x9f0 [ 2362.560849] __add_to_page_cache_locked+0x708/0xcf0 [ 2362.561991] ? file_write_and_wait_range+0x130/0x130 [ 2362.563149] ? memcg_drain_all_list_lrus+0x6d0/0x6d0 [ 2362.564322] ? find_get_entry+0x2d9/0x6e0 [ 2362.565270] add_to_page_cache_lru+0xe6/0x2e0 [ 2362.566288] ? add_to_page_cache_locked+0x40/0x40 [ 2362.567380] ? __page_cache_alloc+0x10d/0x360 [ 2362.568413] pagecache_get_page+0x38b/0xc80 [ 2362.569412] __ext4_block_zero_page_range+0x97/0x940 [ 2362.570583] ext4_truncate+0xede/0x12b0 [ 2362.571500] ? ext4_punch_hole+0x1110/0x1110 [ 2362.572499] ? down_write_killable+0x180/0x180 [ 2362.573549] ext4_file_write_iter+0x13a5/0x18e0 [ 2362.574626] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2362.575674] ? new_sync_write+0x132/0x660 [ 2362.576636] new_sync_write+0x42c/0x660 [ 2362.577533] ? new_sync_read+0x6f0/0x6f0 [ 2362.578460] ? lock_release+0x6b0/0x6b0 [ 2362.579360] ? selinux_file_permission+0x36/0x510 [ 2362.580485] vfs_write+0x747/0xa30 [ 2362.581301] ksys_write+0x12d/0x260 [ 2362.582121] ? __ia32_sys_read+0xb0/0xb0 [ 2362.583044] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2362.584249] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2362.585417] do_syscall_64+0x33/0x40 [ 2362.586253] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2362.587402] RIP: 0033:0x7f06a9247b19 [ 2362.588245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2362.592323] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2362.594015] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2362.595602] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2362.597197] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2362.598788] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2362.600372] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:29:59 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2362.646798] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryp [ 2362.646798] ion" or missing value [ 2362.661416] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryp [ 2362.661416] ion" or missing value 03:29:59 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:30:16 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:30:16 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryp\"ion']) 03:30:16 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wf,no=', @ANYRESHEX=r1]) 03:30:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)}, {&(0x7f00000000c0)="75981a4f89cc656d1bf9952e00903701853910c881f14a488b3b12e5a78ce6464ceaeec99b56e09b42a24a7e54b8e891962445a016eb4d02a29035dcc38b0f49c54f13e3b22476cbc692bfc5bfbe92a6509648bce092f84e5af57aa74311e89d07dde69da9fbbe3f805c", 0x6a}], 0x2) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:30:16 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f9, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:30:16 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:30:16 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 27) 03:30:16 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x5, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2379.618098] 9pnet: Insufficient options for proto=fd [ 2379.641369] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryp"ion" or missing value [ 2379.655474] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryp"ion" or missing value [ 2379.660635] 9pnet: Insufficient options for proto=fd 03:30:16 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x6, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:30:16 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:30:16 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryp%ion']) 03:30:16 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2379.843704] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryp%ion" or missing value 03:30:16 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="ffec2b80f5b729d34a2f0000", @ANYRESHEX]) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) fsetxattr$security_capability(r1, &(0x7f0000001080), &(0x7f00000010c0)=@v1={0x1000000, [{0x80000000, 0xfff}]}, 0xc, 0x3) pread64(r0, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000080), 0x2, 0x0) [ 2379.873967] FAULT_INJECTION: forcing a failure. [ 2379.873967] name failslab, interval 1, probability 0, space 0, times 0 [ 2379.876269] CPU: 0 PID: 33966 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2379.877662] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2379.878743] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryp%ion" or missing value [ 2379.879327] Call Trace: [ 2379.879358] dump_stack+0x107/0x167 [ 2379.879385] should_fail.cold+0x5/0xa [ 2379.879413] ? create_object.isra.0+0x3a/0xa20 [ 2379.884074] should_failslab+0x5/0x20 [ 2379.884852] kmem_cache_alloc+0x5b/0x360 [ 2379.885690] create_object.isra.0+0x3a/0xa20 [ 2379.886583] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2379.887622] kmem_cache_alloc+0x159/0x360 [ 2379.888473] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2379.889543] xas_alloc+0x336/0x440 [ 2379.890281] xas_create+0x35f/0x1040 03:30:16 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfIno=', @ANYRESHEX=r1]) [ 2379.891065] xas_store+0x90/0x1c40 [ 2379.891992] ? xas_find_conflict+0x4a6/0x9f0 [ 2379.892905] __add_to_page_cache_locked+0x708/0xcf0 [ 2379.893946] ? file_write_and_wait_range+0x130/0x130 03:30:16 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2379.894985] ? memcg_drain_all_list_lrus+0x6d0/0x6d0 [ 2379.896106] add_to_page_cache_lru+0xe6/0x2e0 [ 2379.897023] ? add_to_page_cache_locked+0x40/0x40 [ 2379.898008] ? __page_cache_alloc+0x10d/0x360 [ 2379.898918] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2379.899997] pagecache_get_page+0x38b/0xc80 [ 2379.900890] __ext4_block_zero_page_range+0x97/0x940 [ 2379.901950] ext4_truncate+0xede/0x12b0 [ 2379.902775] ? ext4_punch_hole+0x1110/0x1110 [ 2379.903683] ? down_write_killable+0x180/0x180 [ 2379.904653] ext4_file_write_iter+0x13a5/0x18e0 [ 2379.905622] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2379.906554] ? __lockdep_reset_lock+0x180/0x180 [ 2379.907507] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2379.908587] ? SOFTIRQ_verbose+0x10/0x10 [ 2379.909427] new_sync_write+0x42c/0x660 [ 2379.910252] ? new_sync_read+0x6f0/0x6f0 [ 2379.911076] ? ksys_write+0x12d/0x260 [ 2379.911855] ? lock_release+0x6b0/0x6b0 [ 2379.912682] ? selinux_file_permission+0x36/0x510 [ 2379.913669] ? __fget_files+0x296/0x480 [ 2379.914494] vfs_write+0x747/0xa30 [ 2379.915228] ksys_write+0x12d/0x260 [ 2379.915985] ? __ia32_sys_read+0xb0/0xb0 [ 2379.916817] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2379.917880] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2379.918946] do_syscall_64+0x33/0x40 [ 2379.919704] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2379.920769] RIP: 0033:0x7f06a9247b19 [ 2379.921534] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2379.925242] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2379.926811] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2379.928268] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2379.929716] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2379.931164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2379.932628] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:30:16 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:30:16 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x7, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:30:17 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2380.006311] 9pnet_virtio: no channels available for device 9p [ 2380.011457] 9pnet: Insufficient options for proto=fd 03:30:33 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e01, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:30:33 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryp,ion']) 03:30:33 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 28) 03:30:33 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x10400, 0x0) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:30:33 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:30:33 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:30:33 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfQno=', @ANYRESHEX=r1]) 03:30:33 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2396.935489] 9pnet: Insufficient options for proto=fd [ 2396.935782] 9pnet: Insufficient options for proto=fd [ 2396.939362] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryp" or missing value [ 2396.955798] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryp" or missing value [ 2396.977897] FAULT_INJECTION: forcing a failure. [ 2396.977897] name failslab, interval 1, probability 0, space 0, times 0 [ 2396.980397] CPU: 1 PID: 34419 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2396.981933] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2396.983790] Call Trace: [ 2396.984414] dump_stack+0x107/0x167 [ 2396.985251] should_fail.cold+0x5/0xa [ 2396.986102] ? xas_alloc+0x336/0x440 [ 2396.986959] should_failslab+0x5/0x20 [ 2396.987813] kmem_cache_alloc+0x5b/0x360 [ 2396.988742] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2396.989916] xas_alloc+0x336/0x440 [ 2396.990717] xas_create+0x35f/0x1040 [ 2396.991584] xas_store+0x90/0x1c40 [ 2396.992398] ? xas_find_conflict+0x4a6/0x9f0 [ 2396.993405] __add_to_page_cache_locked+0x708/0xcf0 [ 2396.994536] ? file_write_and_wait_range+0x130/0x130 [ 2396.995675] ? memcg_drain_all_list_lrus+0x6d0/0x6d0 [ 2396.996812] ? find_get_entry+0x2d9/0x6e0 [ 2396.997738] add_to_page_cache_lru+0xe6/0x2e0 [ 2396.998734] ? add_to_page_cache_locked+0x40/0x40 [ 2396.999800] ? __page_cache_alloc+0x10d/0x360 [ 2397.000791] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2397.001865] pagecache_get_page+0x38b/0xc80 [ 2397.002817] ? jbd2__journal_start+0xf3/0x890 [ 2397.003819] __ext4_block_zero_page_range+0x97/0x940 [ 2397.004956] ? __ext4_journal_start_sb+0x214/0x430 [ 2397.006062] ext4_truncate+0xede/0x12b0 [ 2397.006957] ? ext4_punch_hole+0x1110/0x1110 [ 2397.007930] ? down_write_killable+0x180/0x180 [ 2397.008971] ext4_file_write_iter+0x13a5/0x18e0 [ 2397.010029] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2397.011040] ? __lockdep_reset_lock+0x180/0x180 [ 2397.012076] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2397.013267] ? SOFTIRQ_verbose+0x10/0x10 [ 2397.014209] new_sync_write+0x42c/0x660 [ 2397.015119] ? new_sync_read+0x6f0/0x6f0 [ 2397.016047] ? ksys_write+0x12d/0x260 [ 2397.016932] ? lock_release+0x6b0/0x6b0 [ 2397.017844] ? selinux_file_permission+0x36/0x510 [ 2397.018953] ? __fget_files+0x296/0x480 [ 2397.019883] vfs_write+0x747/0xa30 [ 2397.020721] ksys_write+0x12d/0x260 [ 2397.021561] ? __ia32_sys_read+0xb0/0xb0 [ 2397.022506] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2397.023705] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2397.024912] do_syscall_64+0x33/0x40 [ 2397.025770] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2397.026937] RIP: 0033:0x7f06a9247b19 [ 2397.027796] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2397.031974] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2397.033723] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2397.035372] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2397.036981] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2397.038583] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2397.040206] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:30:34 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:30:34 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:30:34 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:30:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encrypt\non']) 03:30:34 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:30:34 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2397.287278] EXT4-fs (sda): Unrecognized mount option "test_dummy_encrypt [ 2397.287278] on" or missing value [ 2397.301347] EXT4-fs (sda): Unrecognized mount option "test_dummy_encrypt [ 2397.301347] on" or missing value 03:30:49 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e01, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:30:49 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 29) 03:30:49 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:30:49 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2412.546231] 9pnet: Insufficient options for proto=fd 03:30:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfRno=', @ANYRESHEX=r1]) 03:30:49 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) syz_io_uring_setup(0x1d, &(0x7f0000000000), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000080)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_io_uring_setup(0x1d, &(0x7f0000000000), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000080)=0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000300)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r5}, 0x0) syz_io_uring_submit(r0, r4, &(0x7f0000000100)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r2, 0x0, &(0x7f00000000c0)="9e59fcc6ecfbe39f53ab3679b6a3f630626b5468616e24145cf671a7364ee008705972c68c08", 0x26, 0x8014}, 0x3) syz_io_uring_submit(r0, r1, &(0x7f0000000300)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r2}, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000080)=@IORING_OP_POLL_REMOVE={0x7, 0x2, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}, 0x1) 03:30:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:30:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encrypt\"on']) [ 2412.564537] 9pnet: Insufficient options for proto=fd [ 2412.568542] EXT4-fs (sda): Unrecognized mount option "test_dummy_encrypt"on" or missing value [ 2412.580566] EXT4-fs (sda): Unrecognized mount option "test_dummy_encrypt"on" or missing value 03:30:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf903, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:30:49 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:30:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encrypt%on']) 03:30:49 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2412.688739] FAULT_INJECTION: forcing a failure. [ 2412.688739] name failslab, interval 1, probability 0, space 0, times 0 [ 2412.690225] CPU: 1 PID: 34662 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2412.691114] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2412.692181] Call Trace: [ 2412.692598] dump_stack+0x107/0x167 [ 2412.693076] should_fail.cold+0x5/0xa [ 2412.693571] ? create_object.isra.0+0x3a/0xa20 [ 2412.694164] should_failslab+0x5/0x20 [ 2412.694652] kmem_cache_alloc+0x5b/0x360 [ 2412.695172] create_object.isra.0+0x3a/0xa20 [ 2412.695732] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2412.696396] kmem_cache_alloc+0x159/0x360 [ 2412.696936] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2412.697624] xas_alloc+0x336/0x440 [ 2412.698089] xas_create+0x35f/0x1040 [ 2412.698594] xas_store+0x90/0x1c40 [ 2412.699058] ? xas_find_conflict+0x4a6/0x9f0 [ 2412.699635] __add_to_page_cache_locked+0x708/0xcf0 [ 2412.700295] ? file_write_and_wait_range+0x130/0x130 [ 2412.700959] ? memcg_drain_all_list_lrus+0x6d0/0x6d0 [ 2412.701591] ? find_get_entry+0x2d9/0x6e0 [ 2412.702139] add_to_page_cache_lru+0xe6/0x2e0 [ 2412.702728] ? add_to_page_cache_locked+0x40/0x40 [ 2412.703361] ? __page_cache_alloc+0x10d/0x360 [ 2412.703945] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2412.704592] pagecache_get_page+0x38b/0xc80 [ 2412.705157] ? jbd2__journal_start+0xf3/0x890 [ 2412.705739] __ext4_block_zero_page_range+0x97/0x940 [ 2412.706416] ? __ext4_journal_start_sb+0x214/0x430 [ 2412.707067] ext4_truncate+0xede/0x12b0 [ 2412.707599] ? ext4_punch_hole+0x1110/0x1110 [ 2412.708172] ? down_write_killable+0x180/0x180 [ 2412.708780] ext4_file_write_iter+0x13a5/0x18e0 [ 2412.709407] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2412.710005] ? __lockdep_reset_lock+0x180/0x180 [ 2412.710620] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2412.711289] ? SOFTIRQ_verbose+0x10/0x10 [ 2412.711821] new_sync_write+0x42c/0x660 [ 2412.712339] ? new_sync_read+0x6f0/0x6f0 [ 2412.712880] ? ksys_write+0x12d/0x260 [ 2412.713379] ? lock_release+0x6b0/0x6b0 [ 2412.713903] ? selinux_file_permission+0x36/0x510 [ 2412.714531] ? __fget_files+0x296/0x480 [ 2412.715054] vfs_write+0x747/0xa30 [ 2412.715518] ksys_write+0x12d/0x260 [ 2412.715995] ? __ia32_sys_read+0xb0/0xb0 [ 2412.716536] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2412.717219] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2412.717877] do_syscall_64+0x33/0x40 [ 2412.718338] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2412.718992] RIP: 0033:0x7f06a9247b19 [ 2412.719471] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2412.721837] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2412.722824] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2412.723748] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2412.724680] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2412.725600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2412.726494] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 [ 2412.766672] EXT4-fs (sda): Unrecognized mount option "test_dummy_encrypt%on" or missing value 03:30:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfSno=', @ANYRESHEX=r1]) 03:30:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:30:49 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:30:49 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:30:49 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="74200000003da18847496664", @ANYRESHEX]) [ 2412.803766] EXT4-fs (sda): Unrecognized mount option "test_dummy_encrypt%on" or missing value [ 2412.837494] 9pnet_virtio: no channels available for device 9p [ 2412.853477] 9pnet: Insufficient options for proto=fd 03:31:05 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 30) 03:31:05 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfTno=', @ANYRESHEX=r1]) 03:31:05 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encrypt,on']) 03:31:05 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1030000, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:05 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:05 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x11e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:06 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf903, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:06 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000001b00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="08008e00", @ANYRES32, @ANYBLOB="9866884d236a6e0686cc58c5d9d22b84d041bd9247fe4d60ebf26e9c5170ac5c553f82490325e31ae4824b5c190311556cf5000008000700", @ANYRES32, @ANYBLOB], 0x1180}, 0x1, 0x0, 0x0, 0x4}, 0xcb25344f1b4de639) syncfs(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 2428.957972] 9pnet: Insufficient options for proto=fd [ 2428.963113] 9pnet: Insufficient options for proto=fd [ 2428.965233] EXT4-fs (sda): Unrecognized mount option "test_dummy_encrypt" or missing value [ 2428.993159] EXT4-fs (sda): Unrecognized mount option "test_dummy_encrypt" or missing value 03:31:06 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:06 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:06 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encrypti\nn']) [ 2429.181776] FAULT_INJECTION: forcing a failure. [ 2429.181776] name failslab, interval 1, probability 0, space 0, times 0 03:31:06 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2429.184847] CPU: 0 PID: 35115 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2429.185990] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2429.187339] Call Trace: [ 2429.187775] dump_stack+0x107/0x167 [ 2429.188375] should_fail.cold+0x5/0xa [ 2429.189012] ? create_object.isra.0+0x3a/0xa20 [ 2429.189757] should_failslab+0x5/0x20 [ 2429.190439] kmem_cache_alloc+0x5b/0x360 [ 2429.191155] create_object.isra.0+0x3a/0xa20 [ 2429.191912] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2429.192814] kmem_cache_alloc+0x159/0x360 [ 2429.193536] alloc_buffer_head+0x20/0x110 [ 2429.194255] alloc_page_buffers+0x14d/0x6d0 [ 2429.195014] create_empty_buffers+0x2c/0x640 [ 2429.195745] ? jbd2__journal_start+0xf3/0x890 [ 2429.196520] __ext4_block_zero_page_range+0x798/0x940 [ 2429.197395] ext4_truncate+0xede/0x12b0 [ 2429.198090] ? ext4_punch_hole+0x1110/0x1110 [ 2429.198819] ? down_write_killable+0x180/0x180 [ 2429.199621] ext4_file_write_iter+0x13a5/0x18e0 [ 2429.200449] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2429.201240] ? __lockdep_reset_lock+0x180/0x180 [ 2429.202044] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2429.202956] ? SOFTIRQ_verbose+0x10/0x10 [ 2429.203669] new_sync_write+0x42c/0x660 [ 2429.204356] ? new_sync_read+0x6f0/0x6f0 [ 2429.205086] ? ksys_write+0x12d/0x260 [ 2429.205770] ? lock_release+0x6b0/0x6b0 [ 2429.206461] ? selinux_file_permission+0x36/0x510 [ 2429.207300] ? __fget_files+0x296/0x480 [ 2429.208004] vfs_write+0x747/0xa30 [ 2429.208629] ksys_write+0x12d/0x260 [ 2429.209258] ? __ia32_sys_read+0xb0/0xb0 [ 2429.209972] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2429.210872] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2429.211770] do_syscall_64+0x33/0x40 [ 2429.212400] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2429.213304] RIP: 0033:0x7f06a9247b19 [ 2429.213916] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2429.217138] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2429.218397] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2429.219628] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2429.220892] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2429.222126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2429.223295] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 [ 2429.246526] EXT4-fs (sda): Unrecognized mount option "test_dummy_encrypti [ 2429.246526] n" or missing value [ 2429.272447] EXT4-fs (sda): Unrecognized mount option "test_dummy_encrypti [ 2429.272447] n" or missing value 03:31:20 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encrypti\"n']) 03:31:20 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181920ada, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tpans=fd,rfd', @ANYRESHEX]) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r1, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) dup2(r0, r1) 03:31:20 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 31) 03:31:20 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfVno=', @ANYRESHEX=r1]) 03:31:20 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2010000, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:20 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3f9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:20 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1030000, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:20 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2443.634472] 9pnet_virtio: no channels available for device 9p [ 2443.640372] 9pnet: Insufficient options for proto=fd [ 2443.643605] EXT4-fs (sda): Unrecognized mount option "test_dummy_encrypti"n" or missing value [ 2443.664726] EXT4-fs (sda): Unrecognized mount option "test_dummy_encrypti"n" or missing value 03:31:20 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:20 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:20 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:20 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encrypti%n']) [ 2443.826220] FAULT_INJECTION: forcing a failure. [ 2443.826220] name failslab, interval 1, probability 0, space 0, times 0 [ 2443.830046] CPU: 1 PID: 35358 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2443.831427] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2443.833080] Call Trace: [ 2443.833615] dump_stack+0x107/0x167 [ 2443.834345] should_fail.cold+0x5/0xa [ 2443.835110] ? jbd2__journal_start+0x190/0x890 [ 2443.836104] should_failslab+0x5/0x20 [ 2443.836980] kmem_cache_alloc+0x5b/0x360 [ 2443.837905] jbd2__journal_start+0x190/0x890 [ 2443.838903] __ext4_journal_start_sb+0x214/0x430 [ 2443.839975] ext4_dirty_inode+0xbc/0x130 [ 2443.840891] ? ext4_setattr+0x22c0/0x22c0 [ 2443.841816] __mark_inode_dirty+0x492/0xf10 [ 2443.842778] ? generic_update_time+0x211/0x370 [ 2443.843812] generic_update_time+0x21c/0x370 [ 2443.844808] file_update_time+0x43a/0x520 [ 2443.845740] ? evict_inodes+0x420/0x420 [ 2443.846632] ? down_write_killable+0x180/0x180 [ 2443.847654] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2443.848889] file_modified+0x7d/0xa0 [ 2443.849724] ext4_buffered_write_iter+0xff/0x4d0 [ 2443.850787] ext4_file_write_iter+0xc11/0x18e0 [ 2443.851840] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2443.852883] ? new_sync_write+0x122/0x660 [ 2443.853778] ? new_sync_write+0x132/0x660 [ 2443.854622] new_sync_write+0x42c/0x660 [ 2443.855423] ? new_sync_read+0x6f0/0x6f0 [ 2443.856258] ? lock_release+0x6b0/0x6b0 [ 2443.857140] ? selinux_file_permission+0x36/0x510 03:31:20 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfbno=', @ANYRESHEX=r1]) [ 2443.858204] vfs_write+0x747/0xa30 [ 2443.859125] ksys_write+0x12d/0x260 [ 2443.859914] ? __ia32_sys_read+0xb0/0xb0 [ 2443.860799] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2443.861907] do_syscall_64+0x33/0x40 [ 2443.862703] entry_SYSCALL_64_after_hwframe+0x61/0xc6 03:31:20 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2443.863791] RIP: 0033:0x7f06a9247b19 [ 2443.864692] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2443.869317] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2443.871019] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2443.872612] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2443.874140] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2443.875557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2443.876995] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:31:20 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2010000, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2443.906211] EXT4-fs (sda): Unrecognized mount option "test_dummy_encrypti%n" or missing value [ 2443.911784] EXT4-fs (sda): Unrecognized mount option "test_dummy_encrypti%n" or missing value 03:31:20 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:20 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encrypti,n']) [ 2443.988604] 9pnet: Insufficient options for proto=fd 03:31:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = fcntl$dupfd(r0, 0x0, r1) recvfrom$inet6(r2, &(0x7f0000000100), 0x0, 0x10000, &(0x7f0000000180)={0xa, 0x4e24, 0x4, @empty, 0x3ff}, 0x1c) listen(r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1e) r4 = accept4(r1, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, r3) sendmsg$FOU_CMD_GET(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x24, 0x0, 0x0, 0x70bd27, 0x0, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e22}, @FOU_ATTR_PEER_V4={0x8, 0x8, @remote}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x10) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=ff,rfd', @ANYRESHEX]) r5 = signalfd4(r1, &(0x7f0000000280)={[0x9]}, 0x8, 0x80000) sendmmsg$inet(r5, &(0x7f0000001940)=[{{&(0x7f00000002c0)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000300)="cf1a3e49", 0x4}, {&(0x7f0000000340)="5c5db08d916984498ad0577aa727a68aaebfaa79c6ad591bddb2790b8458a1fc2d7270db3829be437bb46053cab745391f49b0b90fc6f0d501d2e8c3ca39c2f815e7a07575ce93900776473610e81dc574235de791b6c546115ba897e407618c6c98be1961cabc590733d542244027b365e719dbb053259f3bad42a313318482610278c65ce0bb316c8345ffa6fe81cf68fa061210e7506e297958d90832bfd02dfa4d0a3250aff3f4bf097fa04fce2e24e25ea80168e0f513581130ecc5d9e6b832bb7677a7e0552eff1085ae88f2bf80", 0xd1}, {&(0x7f0000000940)="475787a0bb7a2b6bbf53d3c7390705e1f80f647b35a98ec42d0ee8633e1a241317e9e551f5a1db6b0cac05c5008172fc72ca7c476872377d01c4e2254c99e59ed7250719c70b15e4dde5a214383846edc715c8a90e5935dbdbb3b02126eca6d118f3a1244303ef486917801727a5f67bd312522e320414fa4a1e9ad8973243db4e1ccc27da1c80f4e44b615ac844e0898b7acbd66c1c7644bb6254725670f9a5682cdafc01e42c502ef739ae784db675b9936bd7a99309da0024674e4ead6e58c43ef5529a32f663675f2ca1ee6bba6233f1da77e757af95bec20d021dde3b6bd51637bf3c52c0cfc635ee8860857a3ec2023145f0b646a1cdc08f777455767ff82fc76bda6c8f12d6c5e05f6822034851227b02719e3ad09e030ed113b9bfaeb3df9c8186fe3de019e3280167b8d3e41c1c85b5ac067932a5e5f3d5d28e349a997213ac6bb1b26aeea7bcb657f42c635105f3dd3052ddf924c620496f86060c5956aeef9ee749e13953899f136622088465c92f4e12d37e3bd380714d001dd9eadbc757fe4c425deebbeff73647c0d444d36657f73197281c8bd5101972bda737e595a988e627fb9d5c5e82e4c64b32ce277056b06238f607733058f82806c53baa696caa9157d314c21d7c36ee23e32657cefdc9e168074b8525a0c54b534c19f837ecd390ef949c1f4f799adcf89d3691703ef21295e410ede9537079612b91e7a26df3335a59d35142f17aec1cd35fb36133ee206c3611589549596f35132fa291a47cc97742025ed33ccc61c3f1ff63d291408f7ddd30e8114ce4c660d44dfc11990ebd3766f87ecbac078e05ab4179c741ab7b3761f2e1673dd37ad873bbd8a6ae585cbe9d4cf88d5a517467ff1bbed2e4982cac76f022b6c8b9377a3af269b6bed02a7ee02a409981f2bffd90a4672330ca35ca4322d0e03c911be697fa4cec2e630c16740dbe9f0e485f6085bdff8ea402bdc103af4e7d856f8b976325704cb4599faaa10e888b58feeea4d9d88ed99b71be8ca1f1af9bb4ae79ca7100f37ea91949d64d52ade0ede5a6d5dfc6e4cea40849d5aaf6f192a5e9938160ca108d72231f62c4db4a9c61a027ee1abefdbf4c00fc0d5a7d3aa0909fe844e0115505fb65e583d4953df983b513d16804091a79fc2b5f36051060f11a08cd980836220fe3005f44131e7172d25f0423d77f420250545e042687f540017e0dfddb08e4a2ad3b8e0d26d340cf60d6c32a9536db174d922c5da05bcaa11310231bdfb83f58e2d60dc65a18231e808c1c9657781e62c44a5d24c51d156c0f265a9603b7138ee17c9fb8eade873831bd7f379ded291c8140063b3b2e080f944f6bb9dc6cee2d8c4b9ffb5639ed91eb92941bc8ee9f9ac72d1de5758ff9d8591bc88eb59fe6d7e8b31c7b5ce1a7d1fc6f4e0e44674a76dbb171f2d928bdf960a34d0cc55c8d578a304572075574766b34c650883a663ed45b166a380ca2948aa7ed2ac4286a69de58d0221c9ab6d67fc2cb6a38e052cedcceedcf5abadebfcf0860ea613cf6ed09ebc0fb555489facd13a5032a7875152179e46f32fd72e2eb338a960b7aec3635aaae315668796f2d1d516db13c3cd3c31a719f66bb1c9a3f95eaf2cc27db57e1c5d52fbc74979702d702227eb1497fe860b33eaf6c6507e4e061699368122c20fcb055a291c91dfa15d29b10cbf8bf0a18dd9299511c5bb309303a10439c81793fdd5334c8895983fc4e8778af50875a39c2901d0c01a7c865cd86857fad70c5450d48260e10ec9856ab6df6d8cfb00db2f63e4c3d1e38ede206485b3195ad83f1267fb179370559c0280b0c530190154b33f4c185dae3020398ebc0d4eec0dd7ffc25f3c364a0832e80c5b89ec3db286bfac2d1b84f654f4933cc5eb7896c18b21b407c3aa8c365a5e826cf30e0ff37de96b7ede8f9738e4f746f13b8ea9835843dc0b9ce5f1309da4d4993cac6ed3343042c6bf6f9185771fe63c2b637a1b947ee07dd5f3fd1ae10fdeefce6a0d78340fbda3f1c65b29fd0700a58a0c12d7f47a4c75d20de3766e90439e9d66b62817f00d6dd98d1cb9c0812ada4f56da6fa99260465da217c317634c671ec5aea14a59d7daefe6a9d69a6172e3fb708335d67ff1da9402b8134e5fc24ffa3e272ba2269d2653c7b2012f2edae240966b12cad6ae11cd4754ff56c19a336844d17ee8a2d61adb988cb54c57a0477fa818edcb5468a2daf16c675961f61da606eb6edfb6571b4ec9bbdbc4cbd36659f75ab8e44e656a478894bd49d587833a82e641d89a5f5693a340867b3b2ad835d876a2f7c519e0c615e65a8559ffcaa79f6bff34cef75cc5c63e9baf6041271fd34a445036521c722cd78db23dc36431485136fa71648c1bc1e0fda0efb5e2af2d3a9c3443c512ec91733c545d39b83cdb6e3a664b7d7c5cf02c96af0800fb3d50ca00c2fb0563f5607fee8ee75c3eae0c831c06b388cc0827460111c6800ed4c433cafead559f146956d746bc996e08937f09311a6af890e480f62964f8f8d11d0026e6b770c642f597635e58efd791dc971c90a3f0433392f285926a72ae6d206c757cbdd612a37120bc8a34df2b4c782dbc79f4564972e56df2c431ca4e087d033fbfa438b80c5d8341468b9b30e354f825d85823394c2b0762ddae6b3a9c956b1564308566ea0408dc88fbebe0185ed9db663701323e7456068404160d09939d43eef71e23831fde7173bbcbdb035d95c0f3fc536d916871dc20ff03aeecd809ec68be793826a8084b5c235cb8f0bf10a885afb2a39283ca68239b4e6536d66eb67e42470a624e30ca3b83a14d979c33fe4115c1c4d386f5f70e751387a21828278ae7216ec005422710e0a65e78d24c77caac5157657f9353de4762137a1b6b63738d903cf6746aef966cf3866f87452816e4254a435faf57e489333f2e7c4c30af00fa5de54b5609e8dec181641bc1b6df4498c6094d47cb2e0d28da9bcfadf43c7bcefa5c2b08bc429671c48c3f98b5665cda8c7fce5eb260117ddbd75e67c30c8679f070a12a6e2477e1c38f7e1443c84a4b60ff66b9453439436b98213c952fded9ec23aaebbf788a11bc03f4f27cfa36126cfd4efb933d471225c26e167a1f69669ae63615cbb1b8724e31c319e276c8050cdb672e737676fb82816752187daf8088c988de5fb22355f604a2d59375659f1cd090d9d03a7caac120e1e08424933233f1bb14b834d1d954c0035f1298ef734d20b0f2e306d6d3558ba37e80bb9fbf4de8d8abe7a107ff9efed845d1bee0f9ed2d231b09f7975820e7298808232c581abab34e3e3f40b7d14bb18842f437ccf2852b5c67c078eda655a7e6b06424d3bd3f60148e87b76b216e0ac8ef0e97645feedd2122113b9f42d19c568f6cd7131d820721bd1b5fe90fb86e7b0866fcc9ad836326ccc8a7165ee3fbe381019e6cfed22023438a03548fd3b5ddb69986184cc1919dbfe132d82a391724b22122fe2eba7080321ec888057aba93fed24292b2c5fda8f37a1cf31ed3acd88e130c2eff10d443b77f526713e15b32c85f8ed1cefd1f8f6253c8205f89a1f6c49a9399223caf125d8c0657be1eb6a2e4808800d39c738735a73880c62cd9efc7d1122799e528fc5f06538fc4149c5c04207e3341c1b340df82ff7d36755d9ec41405fb5c2b6dfd468da8d4ffcd1b17c92de4f13b91b0ba4ca352c869f963d9133a15969d07c7426d5876d75678921fb16cc57c392cc2b3e2d5e9dad53cd97e4c6caec46ad449ccb79f04b1feca16c47d638221567d216f16364e8f178bf4af1a19615aaee8d96d1fab8a288a7ab5a2b2c59a64663c19eb5140a2ddf05f81ba0a3258707467da4de04663076459d1cc9b0efbbf6ded1932f0538ca45f63e27d90754c330353e05bdd7b5bd0829ce7f090c86e6d2e55ca2987e0c2bdff351df06297296b0569e8df07ec758434447c1ee0fabcf0866128424f94ae2c1a1c2530c25df722f709b23f38fe2976b28946cc668fe62ef301139c62c601e6013b66b4c9b3b0f6fcda900302f2e8f581e94af11439a322dbfd053e27c3386a05d1ad9f4c6c6018e2e6a668ff1e8ca7986d48867202ad62c74dfaaa59343bdc5309f712db412c036511d8ba64fad578d9ad82ab3d3d668bf19def53b45ee7359918522ee7a9cb9cec19bb6fae66ee1fcac914479341e663efda35413d9889207e22517616e7a94793c650a87318abd44bfb1870c8a196b86f4188fc6f1bd5a5d900b0513962221931751ec64e403c9c5ccddefae49d4ee9c6768aad147481bac47e7078f23f355d4f4e891db39b454291b512c489e8bf763c970798c03ac4afbd4b792e3003e8ebab06f15a51182ca396d4b0140304e0a9e8e4a2a5b945f1385a6f51c4df62aed53fd744db1bc53d15c76c7e3f0448857ff41c6a0256db23487f23d00f8ba7c2d55f7b0f52ca2e2af688bc84922fd47d33b5666dec10279f42c4724d1067942a4757f03a59b0acb40fe0ff560b4359847dd51862a83d64780bee374c46bf3328c2b75f8b35e15d33e6f2b4302b5cdcaaf72e9cd40803013f58193ea22781b8e8736ba71ca2a9b46fefa9003202d2dc63e274568a437e5ce38101157954ed6766018cb90e408b63ddc46fffc53dc4bb93888662e424fc8cdf5428516cf90455f7fdd2afe3aa58ae9d0c258a21334e9ca39b996939da5e666935a2236f1cf6e26923ee06e4e7df233229098f18143d3bb356c8b439f1adedbc7c07895250995f47f40dd9407011152673d5426ff29d4ddfdd2b0a00dcbbde732c4ae55cd0c63db39ae9dceb61eedc6f579cfb42b10a4898493677cd5ef7684a3512aded46e026f7644d67a5a6ea39ae51cc0b3eb3a04db32d486b8c9d1fb292c53b57a42fbef4408148751b75ab2659f9f5393850706255f4cfbc9da30919c739b8a0538c97ccf59dedd505c3169fa8c7b561b5142a3f1bbfb1664175d6d590b2e9a0231d53feefc9044d00ef4e43d5cd3e93b0a68243e3679f7c0cc29f72a976ecb22ebce780588fa241c2828beaac9a1d3c98f03aeab9d7c817f11132d1df0b2e76f0381af7d43751fa01ace30a3ab530ba9437ce9d9ac875770343f3a4c91b29c9e041765f54f4cbe78a8841ea8a1949e67436edd8390e6a988654e4a2cfeae245cb5231c2ab1f1bb417b467f11114e16db9e6c975a3e031e165bb9cb37c1ca3161982c4f324434037d21e67140be119c2c1f04bd0d0e058f01d5efcdb7208c12dd01e165f12f3049d3698524cd85a21a986b8684474449da2777240de6ec92dc538b4083337a57fdf0f57d124004fe64d4273510500aaf44bb115fab5d27d4a02721ca8547663affbb002129ad581a24fab7666d86cb4e166f54e43b65fc4047ada7fe9bb169ac72aa1ee1fc359ac2b2ced7b898287872c7649c583bb42b5d8bf642aa9235e257ee4ba9ad592b1881b6089d3148eda489ddc3d7ff9d68b4bcaaa1f719f34af278173b78eb7d179391afef7a4fd19e7eb57a00c8715113ea26aa6df788ce5c61bbe4e32df0381bef575138909fed56e4478458e761ad136c348507ab0c922a991e726c944dededc75abbb2a56ce8849ed078a39800c1380136a6c135b4f93c4deb999703e64134f475b21107d6be62c4dfd0569f266d579233f7e8a5ce61bdf5e218904665ea0360bc46086430c908c7e2d3d2df6b02b5912edd384229a58794e1299f29b5fa917ae8878b6126a6b71cedf3c88dfc4a55010d9566f5a7ab759b539fcdca0649da044fd3ccb5ad24fbfd65754ddab07d70d124", 0x1000}, {&(0x7f0000000440)="5387f20655c223960553c82f8179dd39e59c4d31f8bc05a81606655ab284e8dddd1f447de959ecb8bc3df93b9df8b50a1c5829c4e938e365701614865fb39abef3555998a2d1a329871c1bb5bef03a71a6346bd9e23af6f65b0d28ced6c655ba3f1d30cc03e89f261805586677ddc88495e53fb1f18fa7abcf997fa063f9bfca0b6137d15c482127b7a862cd9f9ee93013388923f673ff", 0x97}, {&(0x7f0000000500)="40e319d16835230070537f214c9c1f387fa6a8", 0x13}, {&(0x7f0000000540)="3d29a0c013f9734a119caccd911edf35b3620e3dcb5ff5b950acc1c62e5bfc3dff36b38c24e2ff8ef76d1a1d8cc5896dc617d5e766c15c4eb2c9d0f71ca600ed79eef0bf757a17f2d7ed366de1a35f0c38e09e53", 0x54}, {&(0x7f00000005c0)="caecf1826e35f8ef20a7a392a24b11d48341637a9cd0a99ba8be2c028730b3bd27d2c45e807eac3b4e4a64eb929458aed0f321393a824b9fb3a6cdc2d5369456c562a6b0d7382d8a52571bcdcb5f066efc643b477841b432e503dc16c3c82de3a4508725aa85df648602", 0x6a}], 0x7, &(0x7f00000006c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xdc}}], 0x18}}, {{&(0x7f0000000700)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000740)="ec4b5d119279ca9289780c9672fe70994508daa1ef1e69029734516207227ae5b8d8d709ae4933a4b32bb0baa2e767c3bf33808dc038fe64078943c34b1d3701deb56ef7f67a89aef86df091b0363c849e26bbe5e5d02b6190d09ecd5f2c28dcb5b8bc6083bb0a5c04ef044bcf4f37e4d2d705c17cdcda4df3b4ea078fd641a88027cd35d6cda283b04b6e3b19c52e3873cbea3b8a7dd3dd62245c0ac14f7649f07af941b97227c56c16e5a2e3fac0ff3e326222b41ace25880d4f004dd7a1cb274b836f0643d277d49f23c4deda4921238e839c744f2d6bc9f21eee178151", 0xdf}], 0x1, &(0x7f0000000880)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7fff}}], 0x30}}], 0x2, 0x80) [ 2444.032554] EXT4-fs (sda): Unrecognized mount option "test_dummy_encrypti" or missing value [ 2444.039609] EXT4-fs (sda): Unrecognized mount option "test_dummy_encrypti" or missing value [ 2444.069504] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 03:31:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2444.086870] 9pnet: Could not find request transport: ff 03:31:35 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfgno=', @ANYRESHEX=r1]) 03:31:35 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:35 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 32) 03:31:35 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r0, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) r1 = openat(r0, &(0x7f0000000140)='./file1\x00', 0x2b43675181a78cdb, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3, 0x30, r1, 0x10000000) futimesat(r1, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {0x1000}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r2, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r3, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) mount$9p_fd(0x20000000, &(0x7f0000001080)='./file1\x00', &(0x7f0000000000), 0x28020, &(0x7f0000001240)=ANY=[@ANYRES32, @ANYRESDEC=r3, @ANYRES16=r4]) 03:31:35 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0xc, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:35 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:35 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryptio\n']) [ 2458.639380] 9pnet: Insufficient options for proto=fd 03:31:35 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:35 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2458.694615] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryptio [ 2458.694615] " or missing value [ 2458.715839] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryptio [ 2458.715839] " or missing value 03:31:35 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:35 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:35 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfqno=', @ANYRESHEX=r1]) [ 2458.777604] FAULT_INJECTION: forcing a failure. [ 2458.777604] name failslab, interval 1, probability 0, space 0, times 0 [ 2458.780661] CPU: 1 PID: 35804 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2458.782206] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2458.784023] Call Trace: [ 2458.784612] dump_stack+0x107/0x167 [ 2458.785428] should_fail.cold+0x5/0xa [ 2458.786263] ? create_object.isra.0+0x3a/0xa20 [ 2458.787271] should_failslab+0x5/0x20 [ 2458.788109] kmem_cache_alloc+0x5b/0x360 [ 2458.789018] ? find_get_entry+0x2d9/0x6e0 [ 2458.789937] create_object.isra.0+0x3a/0xa20 [ 2458.790903] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2458.792024] kmem_cache_alloc+0x159/0x360 [ 2458.792957] jbd2__journal_start+0x190/0x890 [ 2458.793942] __ext4_journal_start_sb+0x214/0x430 [ 2458.794991] ext4_da_write_begin+0x51f/0xdf0 [ 2458.795968] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2458.797136] ? ext4_write_begin+0x1180/0x1180 [ 2458.798115] ? copyout_mc+0x140/0x140 [ 2458.798951] ? current_time+0x160/0x2c0 [ 2458.799834] generic_perform_write+0x20a/0x4f0 [ 2458.800857] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2458.802457] ? down_write_killable+0x180/0x180 [ 2458.803476] ext4_buffered_write_iter+0x244/0x4d0 [ 2458.804576] ext4_file_write_iter+0xc11/0x18e0 [ 2458.805652] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2458.806690] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2458.807875] ? SOFTIRQ_verbose+0x10/0x10 [ 2458.808797] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2458.810041] new_sync_write+0x42c/0x660 [ 2458.810944] ? new_sync_read+0x6f0/0x6f0 [ 2458.811860] ? ksys_write+0x12d/0x260 [ 2458.812725] ? lock_release+0x6b0/0x6b0 [ 2458.813628] ? selinux_file_permission+0x36/0x510 [ 2458.814716] ? __fget_files+0x296/0x480 [ 2458.815627] vfs_write+0x747/0xa30 [ 2458.816438] ksys_write+0x12d/0x260 [ 2458.817273] ? __ia32_sys_read+0xb0/0xb0 [ 2458.818193] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2458.819368] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2458.820529] do_syscall_64+0x33/0x40 [ 2458.821374] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2458.822520] RIP: 0033:0x7f06a9247b19 [ 2458.823356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2458.827444] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2458.829144] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2458.830720] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2458.832295] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2458.833897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2458.835474] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:31:35 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2458.882278] 9pnet: Insufficient options for proto=fd 03:31:50 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:50 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:50 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 33) 03:31:50 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:50 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryptio\"']) 03:31:50 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r1, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:31:50 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:50 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfsno=', @ANYRESHEX=r1]) [ 2473.118957] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryptio"" or missing value [ 2473.131027] 9pnet: Insufficient options for proto=fd [ 2473.133709] 9pnet: Insufficient options for proto=fd [ 2473.150441] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryptio"" or missing value 03:31:50 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1e01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:50 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:50 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:50 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:31:50 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryptio%']) [ 2473.319853] FAULT_INJECTION: forcing a failure. [ 2473.319853] name failslab, interval 1, probability 0, space 0, times 0 [ 2473.322434] CPU: 0 PID: 36140 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2473.323770] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2473.325403] Call Trace: [ 2473.325919] dump_stack+0x107/0x167 [ 2473.326625] should_fail.cold+0x5/0xa [ 2473.327364] ? create_object.isra.0+0x3a/0xa20 [ 2473.328262] should_failslab+0x5/0x20 [ 2473.329003] kmem_cache_alloc+0x5b/0x360 [ 2473.329795] ? find_get_entry+0x2d9/0x6e0 [ 2473.330604] create_object.isra.0+0x3a/0xa20 [ 2473.331462] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2473.332454] kmem_cache_alloc+0x159/0x360 [ 2473.333280] jbd2__journal_start+0x190/0x890 [ 2473.334147] __ext4_journal_start_sb+0x214/0x430 [ 2473.335077] ext4_da_write_begin+0x51f/0xdf0 [ 2473.335938] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2473.336968] ? ext4_write_begin+0x1180/0x1180 [ 2473.337855] ? copyout_mc+0x140/0x140 [ 2473.338600] ? current_time+0x160/0x2c0 [ 2473.339388] generic_perform_write+0x20a/0x4f0 [ 2473.340290] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 03:31:50 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) perf_event_open$cgroup(&(0x7f0000000380)={0x4, 0x80, 0x20, 0x9, 0xfa, 0x20, 0x0, 0x1f, 0x80c10, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x4, 0xfffffffffffffffa}, 0x9000, 0xffffffffffffe4e1, 0x80000000, 0x9, 0x7f, 0x2, 0x1, 0x0, 0x1, 0x0, 0xff}, 0xffffffffffffffff, 0x3, r0, 0x4) clone3(&(0x7f0000000300)={0x8000000, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0x31}, &(0x7f0000000180)=""/7, 0x7, &(0x7f0000000240)=""/157, &(0x7f00000001c0)}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) close(r0) [ 2473.341693] ? down_write_killable+0x180/0x180 [ 2473.342782] ext4_buffered_write_iter+0x244/0x4d0 [ 2473.343715] ext4_file_write_iter+0xc11/0x18e0 [ 2473.344614] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2473.345512] ? __lockdep_reset_lock+0x180/0x180 [ 2473.346411] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2473.347417] ? SOFTIRQ_verbose+0x10/0x10 [ 2473.348213] new_sync_write+0x42c/0x660 [ 2473.348985] ? new_sync_read+0x6f0/0x6f0 [ 2473.349774] ? ksys_write+0x12d/0x260 [ 2473.350516] ? lock_release+0x6b0/0x6b0 [ 2473.351287] ? selinux_file_permission+0x36/0x510 [ 2473.352226] ? __fget_files+0x296/0x480 [ 2473.353008] vfs_write+0x747/0xa30 [ 2473.353710] ksys_write+0x12d/0x260 [ 2473.354414] ? __ia32_sys_read+0xb0/0xb0 [ 2473.355203] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2473.356215] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2473.357224] do_syscall_64+0x33/0x40 [ 2473.357944] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2473.358932] RIP: 0033:0x7f06a9247b19 [ 2473.359649] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2473.363175] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2473.364632] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2473.366013] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2473.367372] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2473.368102] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryptio%" or missing value [ 2473.368734] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2473.368747] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:31:50 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfuno=', @ANYRESHEX=r1]) 03:31:50 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2473.434769] 9pnet: Insufficient options for proto=fd [ 2473.438320] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryptio%" or missing value [ 2473.512889] 9pnet: Insufficient options for proto=fd 03:32:08 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:32:08 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 34) 03:32:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfwno=', @ANYRESHEX=r1]) 03:32:08 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryptio,']) 03:32:08 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2491.391702] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryptio" or missing value 03:32:08 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:32:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:32:08 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="7472616e7348f4009ae9563d66642c726602000000e2a4d24ec1e1c700ad45515aa4373fc3190100000084bb166e8c298dada8c3a6e34c9e5de3e53002b7ca352c2f7966f8c0c476c895523104", @ANYRESHEX]) openat(r0, &(0x7f0000000180)='./file1/file0\x00', 0x0, 0xc0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) [ 2491.424908] 9pnet: Insufficient options for proto=fd [ 2491.433150] EXT4-fs (sda): Unrecognized mount option "test_dummy_encryptio" or missing value [ 2491.439273] 9pnet_virtio: no channels available for device 9p 03:32:08 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:32:08 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:32:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf903, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:32:08 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x1000002, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x200, 0x7, &(0x7f0000000780)=[{&(0x7f0000000180)="548f6611c98a3fda63d220601c5d3f2d60b4519f64f9a044bcd72d72fed64f0d18c202d6e0a58a6bcd3436143e1bd98c6838a4a68b300ef5f19c9c8817a1c4dcccacf9584cb28c6b5636a6aa43533aff8a1feb6e5d2de44e4a3efcde2756bbc8a07e6e6477636a65e99a29640f157451ca605705b3de8f0e85f552ced5aa3a14ca57acc4809b7957015679106c2d9aa1cb0b40fe9d82996cc918e0e38d122e04c171f373ac7b", 0xa6, 0x3}, {&(0x7f0000000240)="30b0cc461e0dd4c607cbb624405ff926587b0b5b5a29d3161e3d49e4080dab87c661387df8bb3757935e3214840fbf6e53ea04cce0ac80932f72a5c0be805eb31f8c7aab0c1d4fd2de4acd3ccae020a3ca49fe4addccdff2f0b43fed40ade302d3446c793b2b599e104c659d10b5a1487550ad11f1d628457450d2ed97b85d070a8b17fd0b9a4dc90ca4190201bf9aefd7a07ada184134617ffae879187cebf95a8efdba977e85b4003e577a272a6207fcad009fb00e96ec84c522d52d9fb5d8c2850f", 0xc3, 0x80}, {&(0x7f0000000340)="31b1c62c1b13854dd9e8a728de768bec821f0f466d9365454af3adb8ea7e84bbb962ffec2e05d671c978a80aeac8a68542825219b9cb378c9d5120f57ba35bd15d77de814a2213ed06512748828c32141ae6e77fc3da3842f085ab", 0x5b, 0x9}, {&(0x7f00000003c0)="a0e75487a3b8a31b8743d1b419f9b745278acb", 0x13, 0x9}, {&(0x7f0000000400)="ca1dad762bb9fbd5316bbbaca9422a8043e65ff857796f0a409daaa9d1435e737b778907e49fefff7823d5572149a9284f449bdc4e6486078fda9d4afc49f786d2aefc27e0740c51703867f9cd9f0a0090bde9823deccaf3dd57487153d8cd08e162d14985af18ba9d00e38d21a8470ff3daa2299b8747bf47290eb4f14f738f8dc881f902a09e8c28cf9dd2062290eee80716a59245efe105a77bbef18073d736d46728880b36b00a4a60113fa2405f4456d5bb6164a552262d8ff55d38d6d6ee3913e48121a9a9d5826bb5fa02c98460e18cf6fbc287f3f69bed73450c0405d79112", 0xe3, 0x8}, {&(0x7f00000005c0)="a48feeb405461fe2baadd0c980cd81f653aef8a2b909dd3d7d32da9bd339b8cfa9862a67e4ca561622122bc57c2b85fdb1d9b97d09324cf90b9f5851a0c7854cf804d3a45a7cb1c55c92159026b660b0a1ce1258a13c8781581feb0dd3d9f293a77df67cdc26f9786fbaa83e282bddebe473171d72e84a5efab4625e90943ddca2263d33cbbebc215012f769b1ecfe0a791eb97a47575c5977b2df3dd0bc0ff53aff8a1994e7e060b519b25fa8a91840cca96c53ec9c92010a18652d35c7828081940026e2f2d21f4d80a47405903f0804f78fc457409d", 0xd7, 0x3}, {&(0x7f00000006c0)="0026cd3f04f3255a9b100e418437f96b2ee486b665435f65ced13dbda7c1eea2067ce8c75bec34e37b637d9446773029261f1cee829b6cefc5a39e740fcfb5aed258681d27a1aca4d283c3c0b42cb58c04ef5b47d84b5d606eb2e780890946c74d99ebb82be1c68cbe7e0e268540d163a2bd8ee88a7e4ae535071c14a6b5777b3e046945ea9a9b72f0a17b106412979ec107ca9ab64560a744a6ef9a74a314599698", 0xa2, 0x559}], 0x100000, &(0x7f0000000840)={[{@debug}, {@nodiscard}, {@data_journal}, {@noauto_da_alloc}, {@max_batch_time={'max_batch_time', 0x3d, 0x1ff}}, {@jqfmt_vfsv1}], [{@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0x1000}}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@broadcast, @in6=@ipv4={""/10, ""/2, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in=@loopback}}, &(0x7f0000000a00)=0xe8) mount$cgroup2(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x800000, &(0x7f0000000a40)={[{@subsystem='perf_event'}, {@memory_recursiveprot}, {@memory_localevents}], [{@uid_eq={'uid', 0x3d, r0}}]}) 03:32:08 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:32:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfd\"o=', @ANYRESHEX=r1]) [ 2491.649000] cgroup2: Unknown parameter 'perf_event' [ 2491.661411] FAULT_INJECTION: forcing a failure. [ 2491.661411] name failslab, interval 1, probability 0, space 0, times 0 [ 2491.664864] CPU: 1 PID: 36588 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2491.666434] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2491.668419] Call Trace: [ 2491.669060] dump_stack+0x107/0x167 [ 2491.669952] should_fail.cold+0x5/0xa [ 2491.670871] ? create_object.isra.0+0x3a/0xa20 [ 2491.671969] should_failslab+0x5/0x20 [ 2491.672885] kmem_cache_alloc+0x5b/0x360 [ 2491.673884] create_object.isra.0+0x3a/0xa20 [ 2491.674939] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2491.676162] kmem_cache_alloc+0x159/0x360 [ 2491.677174] jbd2__journal_start+0x190/0x890 [ 2491.678249] __ext4_journal_start_sb+0x214/0x430 [ 2491.679400] ext4_da_write_begin+0x51f/0xdf0 [ 2491.680497] ? ext4_write_begin+0x1180/0x1180 [ 2491.681584] ? copyout_mc+0x140/0x140 [ 2491.682511] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2491.683666] ? __mark_inode_dirty+0x12e/0xf10 [ 2491.684755] generic_perform_write+0x20a/0x4f0 [ 2491.685880] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2491.687629] ? down_write_killable+0x180/0x180 [ 2491.688738] ext4_buffered_write_iter+0x244/0x4d0 [ 2491.689910] ext4_file_write_iter+0xc11/0x18e0 [ 2491.691028] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2491.692123] ? __lockdep_reset_lock+0x180/0x180 [ 2491.693242] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2491.694512] ? SOFTIRQ_verbose+0x10/0x10 03:32:08 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2491.695498] new_sync_write+0x42c/0x660 [ 2491.696616] ? new_sync_read+0x6f0/0x6f0 [ 2491.697608] ? ksys_write+0x12d/0x260 [ 2491.698528] ? lock_release+0x6b0/0x6b0 [ 2491.699490] ? selinux_file_permission+0x36/0x510 [ 2491.700654] ? __fget_files+0x296/0x480 03:32:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2491.701651] vfs_write+0x747/0xa30 [ 2491.702604] ksys_write+0x12d/0x260 [ 2491.703497] ? __ia32_sys_read+0xb0/0xb0 [ 2491.704486] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2491.705753] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2491.707001] do_syscall_64+0x33/0x40 [ 2491.707899] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2491.709131] RIP: 0033:0x7f06a9247b19 [ 2491.710030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2491.714426] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2491.716225] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2491.717904] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2491.719585] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2491.721263] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2491.722972] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 [ 2491.735332] 9pnet: Insufficient options for proto=fd 03:32:08 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r0, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) openat(r0, &(0x7f0000000080)='./file1\x00', 0x200000, 0x20) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 2491.860432] 9pnet: Insufficient options for proto=fd 03:32:25 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 35) 03:32:25 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f00000000c0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='openpromfs\x00', 0x1020010, &(0x7f00000001c0)='ext4\x00') r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/timer_list\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='./file0/../file0\x00', r0, &(0x7f0000000280)='./file0/../file0\x00') mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:32:25 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x180000, 0x19f) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:32:25 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:32:25 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:32:25 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11e, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:32:25 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80ffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:32:25 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfd,o=', @ANYRESHEX=r1]) [ 2508.766364] 9pnet: Insufficient options for proto=fd [ 2508.787262] EXT4-fs (sda): test_dummy_encryption option not supported [ 2508.787805] 9pnet: Insufficient options for proto=fd 03:32:25 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:32:25 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:32:25 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2508.863028] FAULT_INJECTION: forcing a failure. [ 2508.863028] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2508.866838] CPU: 1 PID: 37046 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2508.868066] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2508.869539] Call Trace: [ 2508.870028] dump_stack+0x107/0x167 [ 2508.870685] should_fail.cold+0x5/0xa [ 2508.871379] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2508.872331] ? current_time+0x160/0x2c0 [ 2508.873059] generic_perform_write+0x279/0x4f0 [ 2508.873905] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2508.875191] ? down_write_killable+0x180/0x180 [ 2508.876007] ext4_buffered_write_iter+0x244/0x4d0 [ 2508.876863] ext4_file_write_iter+0xc11/0x18e0 [ 2508.877693] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2508.878503] ? __lockdep_reset_lock+0x180/0x180 [ 2508.879328] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2508.880245] ? SOFTIRQ_verbose+0x10/0x10 [ 2508.880970] new_sync_write+0x42c/0x660 [ 2508.881693] ? new_sync_read+0x6f0/0x6f0 [ 2508.882409] ? ksys_write+0x12d/0x260 [ 2508.883082] ? lock_release+0x6b0/0x6b0 [ 2508.883784] ? selinux_file_permission+0x36/0x510 [ 2508.884642] ? __fget_files+0x296/0x480 [ 2508.885353] vfs_write+0x747/0xa30 [ 2508.885988] ksys_write+0x12d/0x260 [ 2508.886626] ? __ia32_sys_read+0xb0/0xb0 [ 2508.887343] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2508.888270] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2508.889182] do_syscall_64+0x33/0x40 03:32:25 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2508.889845] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2508.890971] RIP: 0033:0x7f06a9247b19 [ 2508.891630] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2508.894837] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2508.896153] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2508.897388] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2508.898631] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2508.899863] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2508.901103] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:32:25 executing program 0: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0/../file0\x00'}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r1, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000140)=0x237e) ftruncate(r0, 0xfffffffffffffff8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 2508.984033] EXT4-fs (sda): test_dummy_encryption option not supported 03:32:26 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="74555036857e2f8581ad13597c00584208007e1c672f32314eecf870557e707842a32b3ca7f6ae6aca2275d467252ec0a24c76e4e7962d22797fc21d29884fed6f5da8c2c86feffffe87cab3af4b63f8fdd2f6302ef6ed4d4924c903000000594cb58816ddd985abc644898a5c6e8708d9bd1be02986b3939064b805a18e68f206ca059ff655724d19ff20a763c34f7e11f4422200582a00738a5a2d9cbc23b423d4114ed4f8ee64b85b524c360b277e31f1a8ef1e1b7d72a5f048a20afe47986c1284b78d0c11ffb57f21ae675b48e3279fdc8dc0103f9a0d35d435647ca79ad7ebc14df24c8172805bfe57db021111114e0ec1e7ff35066e7930bb376ac259851e22581f39e1bee891489515d6dcc417000000000000000000000000368b519ce447919ab959c2099402e701cbe90285152c674b8c62aff925590ab5da49c45a949e97adcd471dff7bb871a3543b91305bd59264", @ANYRESHEX]) 03:32:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdn\"=', @ANYRESHEX=r1]) 03:32:26 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f9, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2509.036080] 9pnet_virtio: no channels available for device 9p [ 2509.041047] 9pnet: Insufficient options for proto=fd 03:32:43 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:32:43 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:32:43 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:32:43 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:32:43 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:32:43 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdn,=', @ANYRESHEX=r1]) 03:32:43 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:32:43 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 36) [ 2526.686779] EXT4-fs (sda): test_dummy_encryption option not supported [ 2526.702351] EXT4-fs (sda): test_dummy_encryption option not supported 03:32:43 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2526.713818] 9pnet: Insufficient options for proto=fd [ 2526.724147] 9pnet: Insufficient options for proto=fd 03:32:43 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:32:43 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x1400000}}, './file0/../file0\x00'}) mkdirat(r1, &(0x7f0000000140)='./file0/../file0\x00', 0x90) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:32:43 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd\a\x00fd', @ANYRESHEX]) 03:32:43 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:32:43 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0xc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2526.842125] EXT4-fs (sda): test_dummy_encryption option not supported 03:32:43 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11e, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2526.855060] EXT4-fs (sda): test_dummy_encryption option not supported [ 2526.887964] FAULT_INJECTION: forcing a failure. [ 2526.887964] name failslab, interval 1, probability 0, space 0, times 0 [ 2526.892062] CPU: 0 PID: 37492 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2526.893677] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2526.895613] Call Trace: [ 2526.896237] dump_stack+0x107/0x167 [ 2526.897103] should_fail.cold+0x5/0xa [ 2526.898019] ? create_object.isra.0+0x3a/0xa20 [ 2526.899091] should_failslab+0x5/0x20 [ 2526.899977] kmem_cache_alloc+0x5b/0x360 [ 2526.900939] create_object.isra.0+0x3a/0xa20 [ 2526.901975] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2526.903161] kmem_cache_alloc+0x159/0x360 [ 2526.904145] __es_insert_extent+0x3a9/0x12f0 [ 2526.905183] ? do_raw_write_lock+0x11a/0x280 [ 2526.906225] ? do_raw_read_unlock+0x70/0x70 [ 2526.907252] ext4_es_insert_delayed_block+0x299/0x4f0 [ 2526.908437] ? ext4_is_pending+0x210/0x210 [ 2526.909424] ? ext4_has_free_clusters+0x406/0x570 [ 2526.910541] ? percpu_counter_add_batch+0x8b/0x140 [ 2526.911674] ? do_raw_spin_unlock+0x4f/0x220 [ 2526.912692] ? _raw_spin_unlock+0x1a/0x30 [ 2526.913642] ? ext4_da_reserve_space+0xf8/0x460 [ 2526.914735] ext4_da_get_block_prep+0xbf5/0x1190 [ 2526.915830] ? ext4_da_release_space+0x530/0x530 [ 2526.916925] ? create_object.isra.0+0x3ad/0xa20 [ 2526.918045] ? create_page_buffers+0x139/0x230 [ 2526.919112] __block_write_begin_int+0x3d1/0x19c0 [ 2526.920226] ? ext4_da_release_space+0x530/0x530 [ 2526.921334] ? remove_inode_buffers+0x300/0x300 [ 2526.922404] ? jbd2__journal_start+0xf3/0x890 [ 2526.923455] ext4_da_write_begin+0x37d/0xdf0 [ 2526.924479] ? ext4_write_begin+0x1180/0x1180 [ 2526.925498] ? copyout_mc+0x140/0x140 [ 2526.926394] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2526.927649] generic_perform_write+0x20a/0x4f0 [ 2526.928730] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2526.930390] ? down_write_killable+0x180/0x180 [ 2526.931441] ext4_buffered_write_iter+0x244/0x4d0 [ 2526.932546] ext4_file_write_iter+0xc11/0x18e0 [ 2526.933611] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2526.934655] ? __lockdep_reset_lock+0x180/0x180 [ 2526.935712] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2526.936886] ? SOFTIRQ_verbose+0x10/0x10 [ 2526.937815] new_sync_write+0x42c/0x660 [ 2526.938734] ? new_sync_read+0x6f0/0x6f0 [ 2526.939653] ? ksys_write+0x12d/0x260 [ 2526.940517] ? lock_release+0x6b0/0x6b0 [ 2526.941415] ? selinux_file_permission+0x36/0x510 [ 2526.942521] ? __fget_files+0x296/0x480 [ 2526.943434] vfs_write+0x747/0xa30 [ 2526.944246] ksys_write+0x12d/0x260 [ 2526.945066] ? __ia32_sys_read+0xb0/0xb0 [ 2526.946006] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2526.947189] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2526.948363] do_syscall_64+0x33/0x40 [ 2526.949204] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2526.950360] RIP: 0033:0x7f06a9247b19 [ 2526.951198] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2526.955265] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2526.956956] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2526.958555] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2526.960145] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2526.961730] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2526.963319] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:32:58 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 37) 03:32:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x8005, &(0x7f0000000100)=ANY=[@ANYBLOB="014c81bed80d0884020000000010b9ad645100", @ANYRESHEX]) pread64(r0, &(0x7f0000000240)=""/206, 0xce, 0x1000) 03:32:58 executing program 0: accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000540)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0/../file0\x00', 0x240, 0x1c1) syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000140)='./file0/../file0\x00', 0xff, 0x7, &(0x7f0000000440)=[{&(0x7f0000000180)="141fa9e4686b81035383e55e147f988b1d26e3425325cd5b158063e877a03d8c483fdde0c62eec0504b0f91e3d1b6c8497983691aab4eb2be293965f3b771c6985a49a9fb0b3ebc7c6428ea46eefac00607101334ad343c91b44f55626ac5e82e30588c93d0e2acf13abd48c57bd6ababf23d4c8722cfe0d8c23bc2405e3ec2daa262281e416323d36d7bf0e4c97d845d80352c9f0378c62603efb8a93c1bcf70126b606d9c5e62cab306f9416ce059d05f74a6197223eab16", 0xb9, 0xfffffffffffffffa}, {&(0x7f0000000240)="e5429f3fc3a8d19fe7a53bb1bf6c", 0xe, 0x9}, {&(0x7f00000005c0)="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", 0x1000, 0x9}, {&(0x7f0000000280)="9954e2ab5c662870040d892ae92c0d696fd841453f7c4bfe13257502fbcc80d871a4646f5cc8a8da85a77a09060aa5d62aa0ca4c754cbad9031add4179da8bf9b1923f4225b5dd5bacf486", 0x4b, 0x4}, {&(0x7f00000015c0)="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", 0x1000, 0x80000001}, {&(0x7f0000000300)="ee394e5a5ec2a9dddabba7d7160f9d88e8379cc5a958afb13d996d1966", 0x1d, 0x10000}, {&(0x7f0000000340)="7dcfe6b5bc4db82fcda2e716f5ea9965eb54c818dd04ca43efcfba5f8430d2d934997926b7443606db831438754815ca138f50f83ba60a7875f5ad630b5d6f6ef69b505e4049a833b80630ff83b8928c4856f74fc5d9fb80895ba1220f22135f1deb39fe6ce9e70124c9b0115a7702f1b1b4aa5f924d4d5f7d473a1223ba207c90cf2e45f3f70b00932d30cd77712509005a887ab36f32756361f24b01341201aa39a4422c7a4c23061c902769d0ec34621a2522ad2c00a3e0a1bdd93f208b430567a054b221e67de633b97c003465b4f4b2f967aae388356704", 0xda, 0x1}], 0x831000, &(0x7f00000025c0)={[{'ext4\x00'}, {'ext4\x00'}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, 'ext4\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0xfff}}, {@dont_hash}, {@subj_type}, {@dont_hash}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@fowner_lt={'fowner<', 0xee01}}]}) 03:32:58 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:32:58 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:32:58 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:32:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno\"', @ANYRESHEX=r1]) 03:32:58 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2541.669323] 9pnet: Insufficient options for proto=fd [ 2541.671478] EXT4-fs (sda): test_dummy_encryption option not supported [ 2541.714068] EXT4-fs (sda): test_dummy_encryption option not supported 03:32:58 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:32:58 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f9, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:32:58 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:32:58 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:32:58 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000180), &(0x7f00000001c0)='system_u:object_r:xconsole_device_t:s0\x00', 0x27, 0x3) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f00000000c0)=ANY=[@ANYBLOB="346573745f64756d6d795f656e6372797074696f6e413601d3ba7e2c2653e90dbf4525231cdecb4f"]) [ 2541.885903] FAULT_INJECTION: forcing a failure. [ 2541.885903] name failslab, interval 1, probability 0, space 0, times 0 [ 2541.888457] CPU: 0 PID: 37734 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2541.889864] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2541.891562] Call Trace: [ 2541.892107] dump_stack+0x107/0x167 [ 2541.892856] should_fail.cold+0x5/0xa [ 2541.893638] ? jbd2__journal_start+0x190/0x890 [ 2541.894584] should_failslab+0x5/0x20 [ 2541.895359] kmem_cache_alloc+0x5b/0x360 [ 2541.896198] jbd2__journal_start+0x190/0x890 [ 2541.897103] __ext4_journal_start_sb+0x214/0x430 [ 2541.898082] ext4_da_write_begin+0x51f/0xdf0 [ 2541.899014] ? ext4_write_begin+0x1180/0x1180 [ 2541.899928] ? copyout_mc+0x140/0x140 [ 2541.900725] generic_perform_write+0x20a/0x4f0 [ 2541.901676] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2541.903161] ? down_write_killable+0x180/0x180 [ 2541.904126] ext4_buffered_write_iter+0x244/0x4d0 [ 2541.905121] ext4_file_write_iter+0xc11/0x18e0 [ 2541.906073] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2541.907011] ? __lockdep_reset_lock+0x180/0x180 [ 2541.907963] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2541.909018] ? SOFTIRQ_verbose+0x10/0x10 [ 2541.909857] new_sync_write+0x42c/0x660 [ 2541.910687] ? new_sync_read+0x6f0/0x6f0 [ 2541.911512] ? ksys_write+0x12d/0x260 [ 2541.912292] ? lock_release+0x6b0/0x6b0 [ 2541.913103] ? selinux_file_permission+0x36/0x510 [ 2541.914094] ? __fget_files+0x296/0x480 [ 2541.914918] vfs_write+0x747/0xa30 [ 2541.915652] ksys_write+0x12d/0x260 [ 2541.916391] ? __ia32_sys_read+0xb0/0xb0 [ 2541.917221] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2541.918303] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2541.919354] do_syscall_64+0x33/0x40 [ 2541.920111] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2541.921150] RIP: 0033:0x7f06a9247b19 [ 2541.921907] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2541.925619] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2541.927163] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2541.928605] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2541.930043] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2541.931514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2541.932947] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:32:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno,', @ANYRESHEX=r1]) [ 2541.951418] EXT4-fs (sda): Unrecognized mount option "4est_dummy_encryptionA6Óº~" or missing value 03:32:59 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:32:59 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2542.010846] 9pnet: Insufficient options for proto=fd [ 2556.932470] 9pnet: Insufficient options for proto=fd 03:33:13 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e01, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:13 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 38) 03:33:13 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d5c8c77ee484a102477d47f0155e6d1b92d39608db7dd0c6b0339be2e2781a19a6748de72e7afa264143b5bedcbf6a3cd62d2589a557940a2327d32ad64034f2d7dc927271cb098ab40a72894facd84f6a7a88057423ba7c38d2bdfdb550e379d3968e8b747619230ec6ff3667f", @ANYRESHEX=r0, @ANYBLOB="ac776659cbc264", @ANYRESHEX=r1]) 03:33:13 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x1, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_n\x00'/21]) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) pwrite64(r0, &(0x7f0000000140)="80a8078853bf3827e9589e740bca573af8963e1eb1e8b1838e79202a3119f5244c439e9fc0d1a44d14c6be7539e786a3fe02b6c01d40f348906f60de8be0b774bc25765e7a862f879aac70a817da0579aee806bbb9150b5148d580", 0x5b, 0x2b00f51) 03:33:13 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="747202000000000000006664", @ANYRESHEX]) 03:33:13 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:13 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:13 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2556.940046] 9pnet_virtio: no channels available for device 9p [ 2556.949786] EXT4-fs (sda): Unrecognized mount option "test_n" or missing value [ 2556.970108] EXT4-fs (sda): Unrecognized mount option "test_n" or missing value 03:33:14 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:14 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:14 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:14 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0xbbcc6c, &(0x7f0000000140)=ANY=[@ANYBLOB="766573745f64756d6d795f656e6372797074696f6e1831547ae241507010537ab00dd1b15b2e7feb60a094b9d23cc947b3b0273b46263df19112cbf595ecdb5ebe65a5c8102979e8eda7743b59de5c41dcd23cc1cbb6d5db597cb2639d91b5084093b2300d7baae4e60f32bb27b6f4fe01d4064919a5b16b7ed0647f44471b7b31331f91222a6573e1dcc2a5f668760e8e2e562c09881844b6335fe53a86b2453832fb4b34b89da0f0bbd2546e137ae25fe38bc8d82b0043129cb32757042b62"]) 03:33:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000001080)=ANY=[@ANYRES32=r0, @ANYRESHEX]) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r1, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) clone3(&(0x7f00000002c0)={0x100a0080, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0xa}, &(0x7f0000000180)=""/69, 0x45, &(0x7f0000000240)=""/46, &(0x7f0000000280), 0x0, {r1}}, 0x58) 03:33:14 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYRES16=r2, @ANYRESHEX=r1]) [ 2557.201764] FAULT_INJECTION: forcing a failure. [ 2557.201764] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2557.204316] CPU: 1 PID: 38086 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2557.205722] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2557.207414] Call Trace: [ 2557.207957] dump_stack+0x107/0x167 [ 2557.208705] should_fail.cold+0x5/0xa [ 2557.209493] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2557.210591] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2557.211570] ? __mark_inode_dirty+0x12e/0xf10 [ 2557.212492] generic_perform_write+0x279/0x4f0 [ 2557.213442] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2557.214931] ? down_write_killable+0x180/0x180 [ 2557.215876] ext4_buffered_write_iter+0x244/0x4d0 [ 2557.216859] ext4_file_write_iter+0xc11/0x18e0 [ 2557.217807] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2557.218742] ? __lockdep_reset_lock+0x180/0x180 [ 2557.219688] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2557.220745] ? SOFTIRQ_verbose+0x10/0x10 [ 2557.221581] new_sync_write+0x42c/0x660 [ 2557.222409] ? new_sync_read+0x6f0/0x6f0 [ 2557.223234] ? ksys_write+0x12d/0x260 [ 2557.224014] ? lock_release+0x6b0/0x6b0 [ 2557.224823] ? selinux_file_permission+0x36/0x510 [ 2557.225805] ? __fget_files+0x296/0x480 [ 2557.226636] vfs_write+0x747/0xa30 [ 2557.227369] ksys_write+0x12d/0x260 [ 2557.228108] ? __ia32_sys_read+0xb0/0xb0 [ 2557.228941] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2557.230000] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2557.231064] do_syscall_64+0x33/0x40 [ 2557.231820] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2557.232844] RIP: 0033:0x7f06a9247b19 [ 2557.233600] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2557.237309] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2557.238850] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2557.240286] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2557.241725] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2557.243174] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2557.244611] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 [ 2557.252688] 9pnet_virtio: no channels available for device 9p 03:33:14 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2557.275806] 9pnet: Insufficient options for proto=fd [ 2557.288717] EXT4-fs (sda): Unrecognized mount option "vest_dummy_encryption1TzâAPpSz°Ñ±[.ë` ”¹Ò<ÉG³°';F&=ñ‘Ëõ•ìÛ^¾e¥È)yèí§t;YÞ\AÜÒ<Á˶ÕÛY|²c‘µ@“²0{ªäæ2»'¶ôþÔI¥±k~ÐdDG{13‘"*esáÜÂ¥öhvŽ.V" or missing value [ 2557.305512] EXT4-fs (sda): Unrecognized mount option "vest_dummy_encryption1TzâAPpSz°Ñ±[.ë` ”¹Ò<ÉG³°';F&=ñ‘Ëõ•ìÛ^¾e¥È)yèí§t;YÞ\AÜÒ<Á˶ÕÛY|²c‘µ@“²0{ªäæ2»'¶ôþÔI¥±k~ÐdDG{13‘"*esáÜÂ¥öhvŽ.V" or missing value 03:33:37 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 39) 03:33:37 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) fspick(r0, &(0x7f00000000c0)='./file0\x00', 0x1) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:33:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {0x5}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="7472616e733d66642c72666483840faa88e63a746db68147b76f0b8bc0a7b7df95e13b1e6b524b8711b300ac7ce021e35b9ca4eae64a3099eb857f4541e2a2d9fb3abc1e384d98b8edc630a1b6a0f91088623a28ff1bd1b300", @ANYRESHEX]) r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000001dc0)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) fallocate(r3, 0x1, 0x3, 0xffff) r4 = getpid() prlimit64(r4, 0x0, &(0x7f0000000000), 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r5, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) wait4(0xffffffffffffffff, &(0x7f0000001ec0), 0x2, 0x0) clone3(&(0x7f00000002c0)={0x110002680, &(0x7f0000000100), &(0x7f0000000180), &(0x7f0000001d40), {0x36}, &(0x7f0000000940)=""/4096, 0x1000, &(0x7f0000000200)=""/114, &(0x7f0000001d80)=[r2, r2, r4, r1], 0x4, {r5}}, 0x58) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r6, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) r7 = getpid() prlimit64(r7, 0x0, &(0x7f0000000000), 0x0) sendmsg$nl_generic(r6, &(0x7f0000001e80)={&(0x7f0000001940)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001e40)={&(0x7f0000001980)=ANY=[@ANYBLOB="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", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00'], 0x394}}, 0x4000) 03:33:37 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:37 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:37 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:37 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r1, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) clone3(&(0x7f00000008c0)={0x161845500, 0x0, 0x0, 0x0, {}, 0x0, 0xfffffcbd, 0x0, 0x0, 0x0, {r0}}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) [ 2580.685221] EXT4-fs (sda): test_dummy_encryption option not supported [ 2580.698961] 9pnet: Insufficient options for proto=fd 03:33:37 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1e010000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:37 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:37 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:37 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0/../file0\x00', 0x100000001, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000140)=ANY=[@ANYRESOCT=r0]) 03:33:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d66642c52666462206d3d2762c561b3287eb58348ad273e5843f62c24c47b9a601a33be933d027b54a5a158b2f82bb0d05f5aaf2f4868900a3bd628537a636d6851419f3fbf86d14b7e9296e012087e4c290a06c1cc7fdf3f812c3d490d522e683384c8e8e5beb8283e53eefd3ae9d7e94d7ac12c16a18fb1c6cc0a723a644927e12ad103f67c9b60e408361c51dc926cb1d1ef8e10753339a75ac888cfeaba7fe7a54a00000000000000000ad2426b63272b609f64526495a7a153a9e9f1d5587b80ffb0c3f03b36a5f16764ab855d93869263", @ANYRESHEX]) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000080)) 03:33:37 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e01, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2580.863465] FAULT_INJECTION: forcing a failure. [ 2580.863465] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2580.875895] CPU: 0 PID: 38528 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2580.877345] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2580.879059] Call Trace: [ 2580.879606] dump_stack+0x107/0x167 [ 2580.880357] should_fail.cold+0x5/0xa [ 2580.881152] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2580.882245] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2580.883247] ? __mark_inode_dirty+0x12e/0xf10 [ 2580.884171] generic_perform_write+0x279/0x4f0 [ 2580.885115] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2580.886580] ? down_write_killable+0x180/0x180 [ 2580.887528] ext4_buffered_write_iter+0x244/0x4d0 [ 2580.888510] ext4_file_write_iter+0xc11/0x18e0 [ 2580.889490] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2580.890429] ? __lockdep_reset_lock+0x180/0x180 [ 2580.891397] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2580.892471] ? SOFTIRQ_verbose+0x10/0x10 [ 2580.893313] new_sync_write+0x42c/0x660 03:33:37 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2580.894126] ? new_sync_read+0x6f0/0x6f0 [ 2580.895132] ? ksys_write+0x12d/0x260 [ 2580.895912] ? lock_release+0x6b0/0x6b0 [ 2580.896717] ? selinux_file_permission+0x36/0x510 [ 2580.897704] ? __fget_files+0x296/0x480 [ 2580.898530] vfs_write+0x747/0xa30 [ 2580.899284] ksys_write+0x12d/0x260 [ 2580.900052] ? __ia32_sys_read+0xb0/0xb0 [ 2580.901028] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2580.902273] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2580.903005] EXT4-fs (sda): Unrecognized mount option "01777777777777777777777" or missing value [ 2580.903511] do_syscall_64+0x33/0x40 [ 2580.906203] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2580.907438] RIP: 0033:0x7f06a9247b19 [ 2580.908324] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2580.912700] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2580.914507] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2580.916204] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2580.917892] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2580.919600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2580.921290] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:33:37 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf903, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2580.926688] EXT4-fs (sda): Unrecognized mount option "01777777777777777777777" or missing value [ 2580.941989] 9pnet: Insufficient options for proto=fd 03:33:55 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:55 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000001580)='./file0/../file0\x00', 0xe45, 0x0, 0x0, 0x1800880, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0xf3b, 0x5, &(0x7f0000000640)=[{&(0x7f0000000180)="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", 0xfa, 0x199c}, {&(0x7f0000000280)="bed4b3fd59e4e3b712a138b452b5d3ebb918b44515fcdf40055289175fbe2ce60c3adb2026380da72ac31e66b1ed358cdfdf05de27c0e59ed1b0eac3c4312b4f6da731370a6d8e4d1fccaf9882f899e31e29dcb8bb65e866f78637c6555d9a724f6714d44171bdd970a1be089a2c76c9f24360d5a27116dc8054ee639006cf2b44f6dee351b7b97a8f27c0cfcdb8cbb50f54d2f7d52b944e817e", 0x9a, 0x2}, {&(0x7f0000000340)="77da31d8f8af5b4ef0b480c8e59ed4c4e44958524883e09011699c180d4f5f96807ee9722cbbdd4f45f38732c37728eef2f3cde93b2bcb6e7e5cb1c29b88e125a8febee5bea812b05c41c692a57ebbe4eb3dcd0659b392e149a646d95c5ab58023838d0d052585fef8a14e813a7e71f72613a28816d6c8c65062883edf93c03dc7a9a654967c7996ae837c914e1a3d287114a3e6bec2372b8d777fa298c5a53bc415fac44d3ab7f55291410e615a4a178be1abfdfad142bc190822b568ffa8b23f1761e08965567b2eb7d692997fb658e6aa588de9400013a6699d0e841514e5", 0xe0, 0x101}, {&(0x7f0000000440)="ce95931a965dd3a59233414a5ba3e9d839a7153626e7c017b4095f51c279f28e00e8e39c30e544797225b1bfd73e4d60f5f51b33197c8ed17592f446da305ab948910f02757301b8077ecd126367eabb761a9de0933848b5baa4b653d69a61c5c83aeb1b7a2bb50e6751bcd58ec962b1e0e049ea382fe4ab1c5beb7207e839d86b4a1f2a64acdd3e8c2731a69e3719a0f0de1463f03e6979da9630b394995223a4ea963ea4583332d43b4f22353c0835e923cfeac85505df9313e10bd1d3923789d8518697771a645833f6662dc9959f1c47187dfb191fcb883b90e1b2e3e3f4ce5bd88953b8c167852d5dc0ca6ba804461695be80", 0xf5, 0x120000}, {&(0x7f00000005c0)="c4320c1a8a4410f4f4ea0cb173230d380601b993c6be6a040405dd9da1cf987a6f9971bb9fae1945119ccf706f48b8baff2a5455467e0e7f4c594db3976f9948df0b698f2292fd0bc0eea618030a235b85491dd998de2db96ae09c5935868cf28faa8b43d36896a38d1aac", 0x6b, 0x4}], 0x80, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0xf918}}, {@huge_within_size}], [{@dont_appraise}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) r0 = getegid() setgid(r0) mount$9p_virtio(&(0x7f0000000540), &(0x7f0000000740)='./file0/../file0\x00', &(0x7f0000000780), 0x2000, &(0x7f00000007c0)={'trans=virtio,', {[{@dfltgid={'dfltgid', 0x3d, r0}}]}}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r1, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) syz_mount_image$ext4(&(0x7f0000001080)='ext4\x00', &(0x7f00000010c0)='./file0\x00', 0x7fff, 0x2, &(0x7f0000001240)=[{&(0x7f0000001100)="913e1c73d54645dfdf2e4d35c5a168fa941d8fab66bb07ce10e0acf9ac65de356b3432b88aa036822dd6219dc69de6e05fc9901d330ad2541a88fef516c3933ab368fa9fe6d5604480ca0be2326a358c86c4bf7b5a20a6af78023dc21628ed9963aa5fd5f811a6730189dcdf0a61f620ef59f45801044ca283650435922c06391b6b85c8c49903c17d3c77e1dadd6a115c14d8090d09c44426a19f0a434b28b71a43f816b417b2b862fc94799649fc4839db4ef6fb10a1982fbbe29b8728914b3bfd472d28b52b2c", 0xc8, 0x5}, {&(0x7f0000001200)="f0981127cd065da99f73f128de4e15d025f1faa6123cd62178c14e85a67b3227b6f977b5f57c3273d3a7dd6529a95de55cff3fff0ba297463b14", 0x3a, 0x80}], 0x80, &(0x7f0000001280)={[{@noinit_itable}, {@prjquota}, {@nouid32}, {@minixdf}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nobarrier}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}]}) inotify_add_watch(r1, &(0x7f0000000840)='./file0/../file0\x00', 0x10000000) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) sendmsg$sock(r2, &(0x7f0000001540)={&(0x7f0000001300)=@pppoe={0x18, 0x0, {0x4, @empty, 'wg1\x00'}}, 0x80, &(0x7f0000001480)=[{&(0x7f0000001380)="5e5e3a7b90e1212e7528936fa6cab9896806281bf87c7728e8b5977b2e41eb30aacbe76bf9789850ee0ab17bdb0b32d0c701021d5988c9456b8d1c159703279261738f52b84c42f32c7d981043b33b160852b9c8c5e9fe56b1000f0324d761853839f1a069a4e73261f164f58e592411846508eabb08ec0c9ab60ad2c1e5974d48d9d39a4d4718ea77efd33a3069b1ab75aa5b1900c62e0b3542de79bbcdf4664202897fe7a1300cec1e5736c8de9614418d157a0e39fcfcfb88d2ce4444b12111a905ecfa87be8eec", 0xc9}], 0x1, &(0x7f00000014c0)=[@timestamping={{0x14, 0x1, 0x25, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x3ff}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}], 0x60}, 0x20008800) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='teut_dummy_encryption']) openat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', 0x802, 0x6) 03:33:55 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x2) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wno=\x00\x00', @ANYRESHEX=r1]) 03:33:55 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 40) 03:33:55 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:55 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x70000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:55 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpid() prlimit64(r0, 0x0, &(0x7f0000000000), 0x0) pidfd_open(r0, 0x0) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) 03:33:55 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2598.632892] tmpfs: Unsupported parameter 'huge' [ 2598.661527] 9pnet: Insufficient options for proto=fd [ 2598.686571] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 03:33:55 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:55 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf5ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2598.723594] EXT4-fs (sda): Unrecognized mount option "teut_dummy_encryption" or missing value [ 2598.728570] FAULT_INJECTION: forcing a failure. [ 2598.728570] name failslab, interval 1, probability 0, space 0, times 0 [ 2598.731669] CPU: 0 PID: 38771 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2598.733185] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2598.734995] Call Trace: [ 2598.735578] dump_stack+0x107/0x167 [ 2598.736389] should_fail.cold+0x5/0xa [ 2598.737240] ? create_object.isra.0+0x3a/0xa20 [ 2598.738251] should_failslab+0x5/0x20 [ 2598.739097] kmem_cache_alloc+0x5b/0x360 [ 2598.740000] create_object.isra.0+0x3a/0xa20 [ 2598.740976] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2598.742098] kmem_cache_alloc+0x159/0x360 [ 2598.743033] jbd2__journal_start+0x190/0x890 [ 2598.744012] __ext4_journal_start_sb+0x214/0x430 [ 2598.745075] ext4_da_write_begin+0x51f/0xdf0 [ 2598.746065] ? ext4_write_begin+0x1180/0x1180 [ 2598.747089] ? copyout_mc+0x140/0x140 [ 2598.747951] generic_perform_write+0x20a/0x4f0 [ 2598.748959] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2598.750529] ? down_write_killable+0x180/0x180 [ 2598.751564] ext4_buffered_write_iter+0x244/0x4d0 [ 2598.752638] ext4_file_write_iter+0xc11/0x18e0 [ 2598.753686] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2598.754663] ? __lockdep_reset_lock+0x180/0x180 [ 2598.755703] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2598.756837] ? SOFTIRQ_verbose+0x10/0x10 [ 2598.757732] new_sync_write+0x42c/0x660 [ 2598.758595] ? new_sync_read+0x6f0/0x6f0 [ 2598.759482] ? ksys_write+0x12d/0x260 [ 2598.760317] ? lock_release+0x6b0/0x6b0 [ 2598.761167] ? selinux_file_permission+0x36/0x510 [ 2598.762227] ? __fget_files+0x296/0x480 [ 2598.763117] vfs_write+0x747/0xa30 [ 2598.763904] ksys_write+0x12d/0x260 [ 2598.764696] ? __ia32_sys_read+0xb0/0xb0 [ 2598.765580] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2598.766727] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2598.767878] do_syscall_64+0x33/0x40 [ 2598.768699] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2598.769805] RIP: 0033:0x7f06a9247b19 [ 2598.770608] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2598.774495] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2598.776100] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2598.777634] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2598.779141] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2598.780635] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2598.782120] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:33:55 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:55 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:55 executing program 6: ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file1\x00'}) openat(r0, &(0x7f0000000140)='./file1\x00', 0x2b436751819388db, 0x19) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='d\x00'/12, @ANYRESHEX]) [ 2598.824110] tmpfs: Unsupported parameter 'huge' [ 2598.828181] EXT4-fs (sda): Unrecognized mount option "teut_dummy_encryption" or missing value 03:33:55 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf9030000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:56 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:56 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f50756d6d795f656e6372797074696f6e7c4f15239b61268a041403bd2b7398d7f71835031ce65c28d915fc450e9e02ac5627eacde074e00db5b8cce0ae10f294b86de192"]) [ 2599.047917] EXT4-fs (sda): Unrecognized mount option "test_Pummy_encryption|O#›a&Š½+s˜×÷5æ\(ÙüEž¬V'êÍàt൸Ìà®ò”¸má’" or missing value [ 2599.062219] EXT4-fs (sda): Unrecognized mount option "test_Pummy_encryption|O#›a&Š½+s˜×÷5æ\(ÙüEž¬V'êÍàt൸Ìà®ò”¸má’" or missing value 03:34:09 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 41) 03:34:09 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfeffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:09 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x8, 0x0, 0x0, 0x2238000, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d796372797074696f6e0000008e2a40992b9946c104d10f99c4730faa8b895eb3ea88f3f80c2a6bfeff264ca9383b5128f8cfebb7a2817eb253cc644790a91d5d1e8d6fc93a8161b16d0767986e3e20db1451208c3c0e91cd650584f64e40645be23fc9409682f97a166e1cd892432fb9606fb3bb401c63f319a45ccfa4e6e4ba4654516bc288dbdb357de9b4a4b47ce00f0d7dcf992b184cca209398150a9508dbd995aa99b61620c4ea19c30e467e89e9"]) 03:34:09 executing program 4: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file1\x00'}) getdents64(r0, &(0x7f0000000240)=""/238, 0xee) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r1, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x499, 0x3}}, './file1\x00'}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/timer_list\x00', 0x0, 0x0) write$binfmt_script(r3, &(0x7f00000010c0)={'#! ', './file1', [{0x20, 'net/mcfilter6\x00'}, {}, {0x20, '/proc/timer_list\x00'}, {0x20, '\'^^.$,{$^('}, {0x20, 'net/mcfilter6\x00'}], 0xa, "41e93ce080a912a0c75f0a72c86bef7c6611cc472dc279aa82f0d9682291baacd28b8a20d43808337fd38b6085b1f4c7a3f8b04f36510c47bd2f84fb6abe1c2e39269f97a8bee7a67e12db6e749f3d0dd10272eea172292cb7158f4afd40a4bc674eb325a7135205fe615db6209c5ff375fb861f68b067378dc01f717a397fabd7d931d7b9cc29b669600159f36058da2c74b96a66c267aa9d19fc6e3ae734a9b9b3f0ef7fd13f537a99af3911052a983c6d16c8aacd2f5b7b721aab5f941066b1471eef4a613236074fed9c59407a9fec2b96e80123811f8710ed83d06abf18"}, 0x127) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r5, 0xf501, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r6]) 03:34:09 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x111, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:09 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:09 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x7e, @mcast1, 0xfffffffd}}, {{0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r3, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) pidfd_getfd(r3, r0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) r4 = epoll_create(0x20) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000001080)) r5 = dup2(r1, r4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000010c0)={{0x1, 0x1, 0x18, r3, {0x7ff}}, './file1\x00'}) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r7, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r8, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000001100)=[r5, r6, r7, r8], 0x4) 03:34:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf903, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2612.808249] EXT4-fs (sda): Unrecognized mount option "test_dummycryption" or missing value [ 2612.815583] 9pnet: Insufficient options for proto=fd [ 2612.825793] EXT4-fs (sda): Unrecognized mount option "test_dummycryption" or missing value 03:34:09 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 03:34:09 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:09 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:09 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffff8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2612.923883] FAULT_INJECTION: forcing a failure. [ 2612.923883] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2612.926569] CPU: 0 PID: 39022 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2612.927502] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2612.928521] Call Trace: [ 2612.928885] dump_stack+0x107/0x167 [ 2612.929347] should_fail.cold+0x5/0xa [ 2612.929868] __alloc_pages_nodemask+0x182/0x680 [ 2612.930459] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 2612.931260] ? xas_load+0x66/0x2c0 [ 2612.931744] ? find_get_entry+0x2d9/0x6e0 [ 2612.932312] alloc_pages_current+0x187/0x280 [ 2612.932909] __page_cache_alloc+0x2d2/0x360 [ 2612.933492] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2612.934188] pagecache_get_page+0x2c7/0xc80 [ 2612.934768] ? asm_exc_page_fault+0x1e/0x30 [ 2612.935360] grab_cache_page_write_begin+0x64/0xa0 [ 2612.936006] ext4_da_write_begin+0x2f3/0xdf0 [ 2612.936585] ? iov_iter_fault_in_readable+0x1f7/0x410 [ 2612.937276] ? ext4_write_begin+0x1180/0x1180 [ 2612.937821] ? copyout_mc+0x140/0x140 [ 2612.938360] generic_perform_write+0x20a/0x4f0 [ 2612.938982] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2612.939947] ? down_write_killable+0x180/0x180 [ 2612.940557] ext4_buffered_write_iter+0x244/0x4d0 [ 2612.941205] ext4_file_write_iter+0xc11/0x18e0 [ 2612.941833] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2612.942439] ? __lockdep_reset_lock+0x180/0x180 [ 2612.943059] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2612.943746] ? SOFTIRQ_verbose+0x10/0x10 [ 2612.944291] new_sync_write+0x42c/0x660 [ 2612.944824] ? new_sync_read+0x6f0/0x6f0 [ 2612.945368] ? ksys_write+0x12d/0x260 [ 2612.945875] ? lock_release+0x6b0/0x6b0 [ 2612.946413] ? selinux_file_permission+0x36/0x510 [ 2612.947087] ? __fget_files+0x296/0x480 [ 2612.947596] vfs_write+0x747/0xa30 [ 2612.948085] ksys_write+0x12d/0x260 [ 2612.948585] ? __ia32_sys_read+0xb0/0xb0 [ 2612.949120] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2612.949806] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2612.950491] do_syscall_64+0x33/0x40 [ 2612.950989] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2612.951672] RIP: 0033:0x7f06a9247b19 [ 2612.952167] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2612.954586] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2612.955619] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2612.956557] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2612.957490] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2612.958437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2612.959386] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:34:10 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x440040, 0x2) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) [ 2612.997859] EXT4-fs (sda): Unrecognized mount option "tdst[dummy_encryption8›.”ä]û8&" or missing value [ 2613.004965] EXT4-fs (sda): Unrecognized mount option "tdst[dummy_encryption8›.”ä]û8&" or missing value [ 2613.019953] 9pnet: Insufficient options for proto=fd 03:34:28 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:28 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="c82c776664", @ANYRESHEX=r1]) 03:34:28 executing program 6: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file1\x00'}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000180)={{0x1, 0x2}, 0x1, 0x101, 0x1, {0x20, 0xc1}, 0x1b, 0x3}) ioctl$F2FS_IOC_START_VOLATILE_WRITE(0xffffffffffffffff, 0xf503, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) ioctl$BTRFS_IOC_SPACE_INFO(r1, 0xc0109414, &(0x7f0000000940)={0xd6, 0x800, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r2, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {0x7f9}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='d', @ANYRESHEX]) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000080)) 03:34:28 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1e00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:28 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x40082, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:34:28 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 42) 03:34:28 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:28 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2631.007517] 9pnet: Insufficient options for proto=fd [ 2631.043454] 9pnet_virtio: no channels available for device 9p 03:34:28 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:28 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB="746573745f64756dc3b55f656e6372797074696f6c"]) 03:34:28 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:28 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:28 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2631.235186] EXT4-fs (sda): Unrecognized mount option "test_dumõ_encryptiol" or missing value [ 2631.250963] EXT4-fs (sda): Unrecognized mount option "test_dumõ_encryptiol" or missing value [ 2631.252354] FAULT_INJECTION: forcing a failure. [ 2631.252354] name failslab, interval 1, probability 0, space 0, times 0 [ 2631.256825] CPU: 0 PID: 39372 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2631.258250] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2631.259937] Call Trace: [ 2631.260478] dump_stack+0x107/0x167 [ 2631.261222] should_fail.cold+0x5/0xa [ 2631.261993] ? __should_failslab+0x21/0xf0 [ 2631.262854] ? jbd2__journal_start+0x190/0x890 [ 2631.263801] should_failslab+0x5/0x20 [ 2631.264573] kmem_cache_alloc+0x5b/0x360 [ 2631.265421] ? trace_hardirqs_on+0x5b/0x180 [ 2631.266317] jbd2__journal_start+0x190/0x890 [ 2631.267240] __ext4_journal_start_sb+0x214/0x430 [ 2631.268232] ext4_da_write_begin+0x51f/0xdf0 [ 2631.269157] ? ext4_write_begin+0x1180/0x1180 [ 2631.270084] ? copyout_mc+0x140/0x140 [ 2631.270883] generic_perform_write+0x20a/0x4f0 [ 2631.271878] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2631.273363] ? down_write_killable+0x180/0x180 [ 2631.274310] ext4_buffered_write_iter+0x244/0x4d0 [ 2631.275320] ext4_file_write_iter+0xc11/0x18e0 [ 2631.276269] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2631.277197] ? __lockdep_reset_lock+0x180/0x180 [ 2631.278142] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 03:34:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x7e, @mcast1, 0xfffffffd}}, {{0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r3, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) pidfd_getfd(r3, r0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) r4 = epoll_create(0x20) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000001080)) r5 = dup2(r1, r4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000010c0)={{0x1, 0x1, 0x18, r3, {0x7ff}}, './file1\x00'}) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r7, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r8, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000001100)=[r5, r6, r7, r8], 0x4) [ 2631.279196] ? SOFTIRQ_verbose+0x10/0x10 [ 2631.280231] new_sync_write+0x42c/0x660 [ 2631.281041] ? new_sync_read+0x6f0/0x6f0 [ 2631.281865] ? ksys_write+0x12d/0x260 [ 2631.282645] ? lock_release+0x6b0/0x6b0 [ 2631.283460] ? selinux_file_permission+0x36/0x510 [ 2631.284447] ? __fget_files+0x296/0x480 [ 2631.285278] vfs_write+0x747/0xa30 [ 2631.286008] ksys_write+0x12d/0x260 [ 2631.286762] ? __ia32_sys_read+0xb0/0xb0 [ 2631.287604] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2631.288685] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2631.289731] do_syscall_64+0x33/0x40 [ 2631.290496] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2631.291548] RIP: 0033:0x7f06a9247b19 [ 2631.292319] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2631.296025] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2631.297600] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 03:34:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) fsetxattr$security_evm(r3, &(0x7f0000000340), &(0x7f0000000380)=@v2={0x3, 0x2, 0xc, 0x40000000, 0xd, "64b4a658fb4bda7f6c103e0dc3"}, 0x16, 0x3) r4 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x3, 0x204, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x58, 0x4}, 0x8000, 0x7, 0xfffffffd, 0x8, 0xfff, 0x80000000, 0x200, 0x0, 0x1000, 0x0, 0x8}, 0x0, 0xb, r2, 0xb) poll(&(0x7f0000000180)=[{r1, 0x8008}, {r0, 0x2040}, {r4, 0x3}], 0x3, 0x40) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r6, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) ioctl$AUTOFS_IOC_EXPIRE_MULTI(0xffffffffffffffff, 0x40049366, &(0x7f0000000200)=0x2) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080), 0x4000, &(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESHEX=r1, @ANYBLOB="6c77eee3f29a4a", @ANYRESHEX=r5]) [ 2631.299043] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2631.300574] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2631.302024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2631.303485] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:34:28 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:28 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:28 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:28 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x202a00a, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x10001, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='ocfs2\x00', 0xc10008, &(0x7f00000001c0)='ext4\x00') mount$bind(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='.\x00', &(0x7f0000000280), 0x1000000, 0x0) [ 2631.388210] 9pnet: Insufficient options for proto=fd 03:34:28 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:28 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x114e8b7b904, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2631.476202] EXT4-fs (sda): test_dummy_encryption option not supported [ 2631.590799] EXT4-fs (sda): test_dummy_encryption option not supported 03:34:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x7e, @mcast1, 0xfffffffd}}, {{0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r3, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) pidfd_getfd(r3, r0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) r4 = epoll_create(0x20) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000001080)) r5 = dup2(r1, r4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000010c0)={{0x1, 0x1, 0x18, r3, {0x7ff}}, './file1\x00'}) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r7, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r8, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000001100)=[r5, r6, r7, r8], 0x4) 03:34:43 executing program 0: sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x1}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0xa}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @empty}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @private=0xa010101}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x2}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='te4t_dummy_encryption']) 03:34:43 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:43 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 43) [ 2646.323497] EXT4-fs (sda): Unrecognized mount option "te4t_dummy_encryption" or missing value [ 2646.334670] 9pnet: Insufficient options for proto=fd 03:34:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}, 0xffffffff}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000180)={0xda, 0x28, '\x00', 0x0, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0]}) openat(r0, &(0x7f00000000c0)='./file1\x00', 0xa2000, 0x10) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000080)) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) 03:34:43 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:43 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:43 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e010000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:43 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:43 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:43 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:43 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0/../file0\x00'}) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext3\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xfffffffffffffed7, 0x0, 0x92cc6e, &(0x7f00000000c0)=ANY=[]) 03:34:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x7e, @mcast1, 0xfffffffd}}, {{0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r3, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) pidfd_getfd(r3, r0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) r4 = epoll_create(0x20) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000001080)) r5 = dup2(r1, r4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000010c0)={{0x1, 0x1, 0x18, r3, {0x7ff}}, './file1\x00'}) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r7, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r8, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000001100)=[r5, r6, r7, r8], 0x4) 03:34:43 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2646.493484] FAULT_INJECTION: forcing a failure. [ 2646.493484] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2646.497819] CPU: 0 PID: 39726 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2646.499236] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2646.500941] Call Trace: [ 2646.501487] dump_stack+0x107/0x167 [ 2646.502233] should_fail.cold+0x5/0xa [ 2646.503016] __alloc_pages_nodemask+0x182/0x680 [ 2646.503974] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 2646.505182] ? xas_load+0x66/0x2c0 [ 2646.505907] ? find_get_entry+0x2d9/0x6e0 [ 2646.506959] alloc_pages_current+0x187/0x280 [ 2646.506984] __page_cache_alloc+0x2d2/0x360 [ 2646.507013] pagecache_get_page+0x2c7/0xc80 [ 2646.507045] grab_cache_page_write_begin+0x64/0xa0 [ 2646.507071] ext4_da_write_begin+0x2f3/0xdf0 [ 2646.507094] ? iov_iter_fault_in_readable+0x1f7/0x410 [ 2646.507130] ? ext4_write_begin+0x1180/0x1180 [ 2646.507147] ? copyout_mc+0x140/0x140 [ 2646.507188] generic_perform_write+0x20a/0x4f0 03:34:43 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2646.507231] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2646.507240] 9pnet: Insufficient options for proto=fd [ 2646.507263] ? file_modified+0x85/0xa0 [ 2646.507289] ext4_buffered_write_iter+0x244/0x4d0 [ 2646.507316] ext4_file_write_iter+0xc11/0x18e0 [ 2646.507357] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2646.507377] ? __lockdep_reset_lock+0x180/0x180 [ 2646.507402] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2646.507420] ? SOFTIRQ_verbose+0x10/0x10 [ 2646.507453] new_sync_write+0x42c/0x660 [ 2646.507475] ? new_sync_read+0x6f0/0x6f0 [ 2646.507517] ? ksys_write+0x12d/0x260 [ 2646.507543] ? lock_release+0x6b0/0x6b0 03:34:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x7e, @mcast1, 0xfffffffd}}, {{0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r3, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) pidfd_getfd(r3, r0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) r4 = epoll_create(0x20) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000001080)) dup2(r1, r4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000010c0)={{0x1, 0x1, 0x18, r3, {0x7ff}}, './file1\x00'}) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r5, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r6, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) 03:34:43 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:43 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80ffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2646.507565] ? selinux_file_permission+0x36/0x510 [ 2646.507593] ? __fget_files+0x296/0x480 [ 2646.507628] vfs_write+0x747/0xa30 [ 2646.507658] ksys_write+0x12d/0x260 [ 2646.507678] ? __ia32_sys_read+0xb0/0xb0 [ 2646.507704] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2646.507728] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2646.507754] do_syscall_64+0x33/0x40 [ 2646.507776] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2646.507789] RIP: 0033:0x7f06a9247b19 [ 2646.507810] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2646.507821] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2646.507843] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2646.507855] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2646.507867] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2646.507879] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2646.507892] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 [ 2646.579019] EXT4-fs (sda): Unrecognized mount option "/dev/vcsa" or missing value [ 2646.675676] 9pnet: Insufficient options for proto=fd [ 2663.514132] 9pnet: Insufficient options for proto=fd 03:35:00 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70000000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:00 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:00 executing program 4: sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000085}, 0x4) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r1, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r4, 0x1, 0x6, @dev}, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000012c0)={&(0x7f0000001080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001280)={&(0x7f00000010c0)={0x1bc, 0x0, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @HEADER={0x90, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8040800}, 0x4) pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r5, @ANYBLOB=',wfdno=', @ANYRESHEX=r5]) 03:35:00 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000000)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) [ 2663.534189] device lo entered promiscuous mode syz_mount_image$vfat(&(0x7f0000000380), &(0x7f00000003c0)='./file1\x00', 0x9, 0x6, &(0x7f00000025c0)=[{&(0x7f00000005c0)="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", 0x1000}, {&(0x7f0000000400)="6ae50eaefd42b3bed10a7233ee997a32f3c6edcd4979de15ac161f03f9bfeb91ad33f9ccc3cfc95cc8ddb0a28ffa70f31849d918807668866692a1dbf588b2cc95bc36d47aa420fbae3ba63e7dc46ac89a88ed29c54d17c76a80ffd8277fc3c79ade84b88c1bac7fd5d028dd8cc696a0ce11fc4778af0291d49f36e93c413c2682e06728e6f84d7f30284e2c2bdc20226ed4b76cc40f1932f9a71de2070420d9931c61a1b9a5bf8ec2a2786018e63f6f", 0xb0, 0x8}, {&(0x7f00000004c0)="43f3cf5c43096362bba42ae77d0749d720dd62e74a7ff9bca8adad34b21ac329128507df3a02bb31c6c297abaadc3baebacf431821cebc377781fbb6749c173b027dd5c87180b7dec83746ffdd7dca15291a7167391aaa3b3c24311b9d5645e4a0b34492ee11e49d6a2a6b17e4235f06d5d342cecac544b455d389c6669322f822e695db6666e15809deed578fc2f793e60854c6507e3f12c6014f76fbb4186bc47290266ab2118623e4e35744cf24c5ea339562", 0xb4, 0x5}, {&(0x7f00000015c0)="ce8a58335f2cbc033ead1eb507d7fa117d968668c6856291d2d1041a0b8752ebef050726dbb684cc633031e8d0b57a79da98998b3278f72c4a09d6445243bdf95de8acfca40a5d3401131d9562147a3d0c67b8f8ef5c1125592b20a8a440ec2406be652ec3394087b522147c9dc1172d8897c12654a8f52bd307d8d411e2d52e33e2993191cc7a3f02ab9e7e3072cfecae3b27b2758c0d2a208cd0bbd86d6387ec041e341085283e107ba2d0517aa283286013820f907731ff2e18953907302f1f919c60605a40167a20b8f763bb28e9e9bdbb1e6f2b447462c82e7ede35ec19ea82b21e651066b48d319b0aef7cac10fe733d67d63dcfe4c315042d4379ead1b0a0bdae39710153985c34cc49f3a2865e91592190270a6da5cda88ea91f20d42afe0defee2d17036cc859b6e7a14389c06aaa28218af12a0be0f59bb06a3d67a2a0e5b1539df8f7057189990bec2242b2ea03597c7ada86118ed9b436302677848416ba89c4fb470f956c5dcf2620534decb7b2aef3628eb4e1fe349f0c95cf994da7da584e50130ddb0cf8aea5fe37d0ed8859c0536ef2a01b91dded602a8716ee3adcf5695c6a6d29ef32767c974b04f44ef554ede70f888f755e79ff28d63643243d959598566c01e94a5bfc9edbd9fccc4a1b309e593849dcef6fe5b6de5d85d5f720ec000ce5e3800c46157cebf7684dc8478081ceeea8dcd64713aec7ad54b82108898262d2d5faa2976ee501b6d300c3830db4cf1e5da0e8221d7c68ecf1b3524376bde5d30baf0097880d7863edf6a0d5f781de54eb076c7de9f0b984748216ed941a1894bdf27bbf944e95ac72c4ab9b87325b6be62acf08987ef0cc0a1d6385387d18332f43e18b3041a40e0aecdd3fec56cd1913b078e422120f595412926832c0c5bfe5c9cfe91985706733d9d952507a9a1de31f5e3c6b9e5b1f7ce92c631d886f06bdb1f3f2689d36eecee72a38078eb5958ed2937262a09d096a22112f94749c319d0c121f902db06ef76979e68ac06b5e44d6fb2c312ad1be732d5d17956fa004d7c70d623fd1641985384a832d172098b69e5879aa9c68f0159c5d4d6fbf924a90792e51ea97d727c1d6c8b27fbb8190eb6b33a9c89e05935334601ec4232ff0d75504a34a066626a810227e88ea1fae018a8d3683a1f7fb160b5cb03cac0f10eff6f6e829f9ee2cc1dc5854bc78de2e99eb36f5aa66fe366a20fd1c9ddacbb7a0b373c2aa1edd82262bad8b90a522e5dbbeed00ac056ca21bf9db0b57f0c39573ca971927abd279047c341c5a5ccba6b4817a3a278128104de42c774b47800ca67d2a4a5eae514523d665a73da39afddf71e72419df22ba058871ee334f9e4a02eba1ba93b5ed89c11dd0049223297e30d2ab1eb55fc7fd15d2c2c7369ecd466b3c84a02b68fbbe46cceeb185880fbc96b4b56d8dc6e75354622eb3df97854988e914d510f6a15c3e0bf04a357e4821bfeff22d79c1cd1a4cff6b5d4ad627837a35c73047a477015f9d4f90bd1d5c78cdc7c4e9592864ecfba0300f7e95d0032f0ed0a3b26f985f48de52dc320b9ab7ecc63e0a96f0a742e5e2e5e2d61e4bb4283b82a4daac1dd2362ea30ad16cf8295888d5903e130acf35796f234876782e94dc55750e25685999bccfd28c3544ae9ddf478109e12f47fc1a69c83773f189982f410f88bc2e9ad5f87fb4aaa6b366367586c2c94e7a5b63865c9d2456d6ca41c0fd1866bdee2da7e3c75d450168b2fb7ad0c3cda20e429c538603c458e20e47ffbbc5a426c6fad6ee251241d1bbb166c978f03f868878a873300b39f58ecc6d89a71e0bc3b5b53a7e9a3542952d131c1b5c7676ae000b7f503b85bfd1b0e52dd10e835a292fc584c5e5f61eb6356b5a7562f85a1962eb2fbdb4e5005e223340db2903bbbe42e92445245e279e2e86a187887b3f1b5faefba52cc29cc4552a301a1728a26d186919ad94649d58af361f5ce44a42df3f7006974d682e005dcf7e5c2b2097a539b3df58f7f70e68247ab82213d81605207f64f56c0b7f9b4534a594c7707bf70df123546f264116a18b74cf25eb7686f398bad2141d8e755e5319aa3730e0a6d0a1861011ec42473bb2882ec1a91dd25f092783ee1e4e0897dc7d9393f76fa01c12bfd070e0608ffe9790c239e347cc3614de0366715ac1de622f9014d69e91ccab4e0e1a6daed4f26e3e54aec0fd2e7ebb3eab6dce85e1e030ffbed6ef2c6437c1295054cda8e850e0b7d9f0c4e322274497468c1c94ecfda0a7df168d6156d8a8b81d6f3a6e0f1ab8e7f649b7caa211964b52f903f5ace8b670b65d9971e1789eb9ecf06141e4e5141a234891e970886468840bdf3bc4dc296ce78c2ceebae09f0e56280a868a792b9743468549fb9234530f68758ddf6b548889c5c647af65695eb7d29f16195232fae39e5e61223af3d4083646448ccbcac6f6730098935929c75edde58a879eb6dbef3b7643eb75061af6345a62bb76d08fdda4d0ce862bf9c5f7567b5492b634bbc4149dd99ee7182d2898a753511897c7d1d1c2a075660b0c5eb710170d2814d7b553dd2519ec2f32aaac3fc3859e342f3b6d147dec5c259f0509b2d0ee93dbaacf82a3913aa6d414af5319258bf797df739e95eaaa1cfd32bd59ceee509d646920d05614e9ce801be828a92ffcdc87428f14547a7f584b15e6883c9923c005d2cc2dd34771ecf8eef471b033f1ca13e529a6a3ba18350c294d7b2996702f379ecfdfe74550a5105dc33c2868a8bdba06c14601448ce5b77a776d8f14bb660ddc110505e1a75d610f8a7a6e636b44834c120c40cc798c53a0696dd39ff4c3eb27ab41b6dfd7035fc114c60ce6e7571d130710d21c7d9e555f11ee43c287352ff3a2b5bbd5ef0590ee3202d5169ac75cc883359095e7900b6d9d4fdabef5dc8d66ecbd4749930e21de217b4585766042bf0fe63484f5ba73404397ef87ff382663f1e58be7ddf584a88d2457ba67ca106f3ec7f143ae4d65a4858fb4a92422875a1956e56120befa00982eb390ccb2ccf47ef76fe7e1941c8f3655d77d226b1adcf0501283f93b96f783b50d1e7953bfc3a8bb59377e32164843c1199883d282ecd6ed8ac5e25dcd52b5690f159410d717b55c403e1df95d2dccfdaa388260a5b04f7811a355223109747b633cfc71d6c439aa76e65a45164dffecbb53497f5ea795a3f5b054ddf4d8ac48a9987b1d30d2b3d73070c07711b5e91f4c975f12ee60598d59ceaeb1f264c7867b222edbbeb9b868fd6a3b586348c0d119ef69ccc13f67e196b2cfda6414a3e3936689bfa383daec55dba2bdd67fbc0705cd242d3c32fa85291ffafbd469749df9aafdd0c70307c1b31113d6bb7bff0878ea719b85d583dba1902bc67b8e3d2de305c2bbe9592cdbf65bc82cca58b8a946c1b8e18982485c1c88d311c6c73b75195d1b569a554905cefedf1eda9c003685fbb155fe8f454c4d94de5347c59c5de7a5901bb2f58a6bd734e1e0908aac83585fb3f87af8e70b71290c9e144555762ca6140aa235c5a4f291fca1381892b11487fc0144a2f10df1e7d352340abeaf1fad1d5d65874e385e0ee660064154d5df19c8b3bcffb29b1c8116d0d4d5f11188f4551919afa75ad1e5b4652c69d2579a36893bb8cfbebd4aa4c79c67eec32e358533ed18d44ca7ae103e237bcd817782882a74e64ec590cc2ddf017eea46c9eded2442404442cda2a6be4f5ae658b86081e02dc369b9c297a317a4c5ee7ed41f12b1ce64080b14718820363318dd17ebd8e24f22d61774248969ea0bebd4fe2ebc22fba099687ce0114347510a5e2afc199541b98b3ad5ecabf464c768c157f0ecc5c2c43c573690fbe243f7cc5550060bc81875cb4c70cdf8f2dce029b86014241280edf8ef56f252be292d4b9b2df34e112ee69385d827ebcc9399bbcd9fcf8edabcc5ed5e4b44701ae99b78ccd848a37f9f493c75d8fd416bb3b3bcab63ea742a9fca715cf2d93a7a74fea1d29c490a55fbca6827b8fe2708e66fa0e5369397a85ffff17a34a3a4eadee967da7e817e049294ad78415803ed33fc27162a0ffea55a469a25f6018da4f1b7670a92604d0013a299d19c9c5058b0b4226dd3da8e5d9fe67bd2b62dd2fc7aed85bf97c388df730ecbeaa2c64162844ad7fb717e749886d3fcc26c4fc6473f69c8f3d9cb53e95e2d9b1f919cdb0d18b1c6a858d5fae95d45c14deee60082b0dfc6703a4162884b984818f8c7bbc25dd235f93856c8c6b271a1a742cb9625bd3599d2fe21cc059b0235540bdfc66385f069c0b58a0ea5ac84309853d7070aa62f99f1539b81e3d84c0a39abdf22c361ae37d5b37dd8be3295d4a74c0cdf21fb3e5f4003c39e6ca598b27dcd1ce6d98fba5317fe425e15f730900c1a49fac941fe0151f9bd9099ec02f1fe6c1c77f71fe9a717fa2c9fdb6a1ae2e6d7503e63f47550fcf544d8b2625af8364277185e79c6a9799287b56619c34af3a38151b6841a8779070a63ca156ea4391c5bf56e6369b0b3f51cf776f7475a7399b20565dd52cc4e7ef9a8e97ed4988d8f9a2ec8c52ab091e0c7f09529a36f68c1385a2b68fe097e08d9b527adc6fe84e492fda4479e5d9b904cf230ec54a35c8980e7f1f575af4de5113918e9888815cbcc358030a9099700bb43c8a6356ab2351d230db4904e93bdce1f505f38bf0585ffcb6bd20ef1f1e2406143a715a341caa7c166bb2e0388dcbe45f034fde1457545ffbc0224f7c05428d51e5a9e8709701fdb0f06da56800a4d548cfc8bb6683405158d62fccca12188974c5ed9603c43dc36609297b67f5f9dac3f25a78fbae418bcf217b021b4e76a6f787cd4b6eb107cf28c5c1a9845c39dddb13182ea02f1ca8a372525ffbd0d9fb2c3ca06e9d9ddc146d357cb432f357321890aa5c09ccb9c9f39610568f75e7d9f023019fa8e8e1c3f1f7f2d3443f12dc70438c2740b0511910adf8b6bdd599737540d2999b5b1b68e7891cd5ef45e192b663eb83e4523cbe36c3ccd7021cc5aa9bfebe54bf565921375eaf99ce36353a5a2f54154fc4e112b3bbe7b38a769b7b87c952085aeec86827c4b997f2b3244c9acdcf02e9b0985691f38f1283cdfa585f762d6a524100b6abcf19bf6f6e1212d71208ff393e9368260ff709b0b0b19f300112c240a3f3b10bcbdfbee1f3da26b709869130c1c65a0980fca6d69fd385bded4fa4edcc7c439b83177f0247885d615102e518308f6558147af32978821b2d5e1c28e044ceb94cb352777f97a9d389fc5bb0555f554b966bdffe23d5bd54f8ca4ed8c97ec0a0093aeb2015e3b372f015c294f3c06a67ab9e529a6c7cba794e0c782b6188d56c71525670573e7bd614cc3b262b611a625f2e242805311558f23ad982bd8f72930c1be081cef1b744328948473da90935ad9a09a8a7caa53e9cf4564a91535a83c9339c8f941801edf654394a56940ea2aca1aa83410782575b6007f4cb81cf0775f94e83f0e4d18bd6e80ebeb70f0468b9b65fb32f7b124e9d4a68a4228b00c4437f14e0458da2b6a5239d032a9090ba7e3cbaeecd05f9ee613853babddb3decc5cc713534928432990dcb63fc421c6803cdc2837444d4da330b39738c1a3e3055c5c9d303ce5dcadae60972ac30a6279f6c801c8988112ea977826f848312cb54bfe737f42db0814753333a870b0a9fd1744cf67e9c8abafacd513155fb9f833d6d37d6e6964a858c662b185a7e3178ded3b242412129a802c53ac8b4077577a7cbd2571b6c732df9ac96e34f674976292c6", 0x1000, 0xd96e}, {&(0x7f00000028c0)="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", 0x1000, 0x3}, {&(0x7f00000038c0)="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", 0x1000, 0x1}], 0x40, &(0x7f0000002680)={[{@fat=@allow_utime={'allow_utime', 0x3d, 0x5b8b}}, {@numtail}, {@numtail}, {@uni_xlateno}, {@shortname_mixed}], [{@fowner_gt}, {@subj_role={'subj_role', 0x3d, 'tmpfs\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'ext4\x00'}}, {@euid_eq={'euid', 0x3d, r0}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@fowner_lt={'fowner<', 0xee01}}, {@uid_eq={'uid', 0x3d, 0xee00}}]}) stat(&(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000140)) clock_gettime(0x0, &(0x7f00000027c0)={0x0, 0x0}) utimes(&(0x7f0000002780)='./file1\x00', &(0x7f0000002800)={{r1, r2/1000+10000}, {0x77359400}}) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0/../file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000300)=[{&(0x7f0000000240)="1d04e0603eef32fea381a177b32a5a2384a2ba7a9d93e8810cad0688fdc254a32a6be785cce7333062e3319fca35258e5e75e121c8d6384fa3d3b5dfdcd9427aa24decc56f0f86f597f97b3c9ecdcda43de94c0e79c92afc44b83ab087e9c3759aa89ebefb1449bd8cc4a5ef0f40d81211ff4fad01d3ad1a118d7e04d6e656c6b6c7f1205690cc9f3e039792d910228e5d2408", 0x93, 0x5}], 0x0, &(0x7f0000000340)={[{@nr_inodes={'nr_inodes', 0x3d, [0x38, 0x53, 0x33, 0x32]}}]}) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x19a8c6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encrypM\'on']) 03:35:00 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x7e, @mcast1, 0xfffffffd}}, {{0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r3, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) pidfd_getfd(r3, r0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) r4 = epoll_create(0x20) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000001080)) dup2(r1, r4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000010c0)={{0x1, 0x1, 0x18, r3, {0x7ff}}, './file1\x00'}) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r5, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') 03:35:00 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 44) 03:35:00 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:00 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e010000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:00 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(r0, &(0x7f00000000c0)='./file0/../file0\x00', 0x20000, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:35:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x7e, @mcast1, 0xfffffffd}}, {{0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r3, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) pidfd_getfd(r3, r0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) r4 = epoll_create(0x20) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000001080)) dup2(r1, r4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000010c0)={{0x1, 0x1, 0x18, r3, {0x7ff}}, './file1\x00'}) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r5, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) 03:35:00 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:00 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf9030000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:00 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2663.671286] EXT4-fs (sda): test_dummy_encryption option not supported [ 2663.678285] 9pnet: Insufficient options for proto=fd 03:35:00 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2663.729094] FAULT_INJECTION: forcing a failure. [ 2663.729094] name failslab, interval 1, probability 0, space 0, times 0 [ 2663.732808] CPU: 0 PID: 39875 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2663.734180] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2663.735836] Call Trace: [ 2663.736365] dump_stack+0x107/0x167 [ 2663.737090] should_fail.cold+0x5/0xa [ 2663.737847] ? jbd2__journal_start+0x190/0x890 [ 2663.738743] should_failslab+0x5/0x20 [ 2663.739487] kmem_cache_alloc+0x5b/0x360 [ 2663.740304] jbd2__journal_start+0x190/0x890 [ 2663.741180] __ext4_journal_start_sb+0x214/0x430 [ 2663.742121] ext4_da_write_begin+0x51f/0xdf0 [ 2663.743000] ? ext4_write_begin+0x1180/0x1180 [ 2663.743909] ? copyout_mc+0x140/0x140 [ 2663.744692] generic_perform_write+0x20a/0x4f0 [ 2663.745615] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2663.747038] ? down_write_killable+0x180/0x180 [ 2663.747960] ext4_buffered_write_iter+0x244/0x4d0 [ 2663.748913] ext4_file_write_iter+0xc11/0x18e0 [ 2663.749835] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2663.750740] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2663.751778] ? SOFTIRQ_verbose+0x10/0x10 [ 2663.752595] new_sync_write+0x42c/0x660 [ 2663.753380] ? new_sync_read+0x6f0/0x6f0 [ 2663.754188] ? ksys_write+0x12d/0x260 [ 2663.754941] ? lock_release+0x6b0/0x6b0 [ 2663.755744] ? selinux_file_permission+0x36/0x510 [ 2663.756753] ? __fget_files+0x296/0x480 [ 2663.757551] vfs_write+0x747/0xa30 [ 2663.758263] ksys_write+0x12d/0x260 [ 2663.759009] ? __ia32_sys_read+0xb0/0xb0 [ 2663.759834] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2663.760896] do_syscall_64+0x33/0x40 [ 2663.761656] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2663.762696] RIP: 0033:0x7f06a9247b19 [ 2663.763450] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2663.767174] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2663.768723] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2663.770170] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2663.771608] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2663.773055] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2663.774492] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:35:00 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xe7, 0x1, &(0x7f0000000200)=[{&(0x7f0000000180)="a5453e5d18fb696909ce6b8cfaf7efe7d819c9daeac681149082ffde0c8b1bf1baaafe5fe5e36f0b2de805d4e74a386970b6d17cd66909f99240b9031fb7b8108421d59afe647c32c3ce0f73d5be65e1d77b3790a8f382c5a057fa055085ff7e68ae94d6e78617b2f7b44a068954082f70c9d778", 0x74, 0x6}], 0x24000, &(0x7f0000000240)={[{@lazytime}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@subj_role={'subj_role', 0x3d, '+/!.\\'}}, {@fsmagic={'fsmagic', 0x3d, 0x79}}]}) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) 03:35:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x7e, @mcast1, 0xfffffffd}}, {{0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r3, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) pidfd_getfd(r3, r0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) r4 = epoll_create(0x20) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000001080)) dup2(r1, r4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000010c0)={{0x1, 0x1, 0x18, r3, {0x7ff}}, './file1\x00'}) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') 03:35:00 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2663.842226] 9pnet: Insufficient options for proto=fd [ 2663.849438] EXT4-fs (sda): test_dummy_encryption option not supported [ 2664.314355] device lo left promiscuous mode 03:35:17 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c776e6f3d0000681afd4baf14f5f0d76ba15d3bb2de7aad855d6af8600e0639f99d261fdee99f6cce9ccdd96c77c8a87a1c5c2f10e079cffefeddec058ebc62e480d3", @ANYRESHEX=r1]) 03:35:17 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 45) 03:35:17 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70000000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:17 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:17 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:17 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x7e, @mcast1, 0xfffffffd}}, {{0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r3, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) pidfd_getfd(r3, r0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) r4 = epoll_create(0x20) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000001080)) dup2(r1, r4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000010c0)={{0x1, 0x1, 0x18, r3, {0x7ff}}, './file1\x00'}) 03:35:17 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:17 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) mount$bind(&(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000180), 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 2680.228183] 9pnet: Insufficient options for proto=fd [ 2680.229328] 9pnet: Insufficient options for proto=fd [ 2680.258744] EXT4-fs (sda): test_dummy_encryption option not supported 03:35:17 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:17 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4b9b7e814010000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:17 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf9030000, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:17 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x7e, @mcast1, 0xfffffffd}}, {{0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r3, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) pidfd_getfd(r3, r0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) r4 = epoll_create(0x20) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000001080)) dup2(r1, r4) [ 2680.370914] FAULT_INJECTION: forcing a failure. [ 2680.370914] name failslab, interval 1, probability 0, space 0, times 0 [ 2680.373553] CPU: 0 PID: 40020 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2680.374972] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2680.376684] Call Trace: [ 2680.377225] dump_stack+0x107/0x167 [ 2680.377973] should_fail.cold+0x5/0xa [ 2680.378751] ? create_object.isra.0+0x3a/0xa20 [ 2680.379688] should_failslab+0x5/0x20 [ 2680.380473] kmem_cache_alloc+0x5b/0x360 [ 2680.381304] ? lru_cache_add+0x45c/0x800 [ 2680.382135] create_object.isra.0+0x3a/0xa20 [ 2680.383030] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2680.384126] kmem_cache_alloc+0x159/0x360 [ 2680.384998] jbd2__journal_start+0x190/0x890 [ 2680.385903] __ext4_journal_start_sb+0x214/0x430 [ 2680.386879] ext4_da_write_begin+0x51f/0xdf0 [ 2680.387796] ? ext4_write_begin+0x1180/0x1180 [ 2680.388723] ? copyout_mc+0x140/0x140 [ 2680.389518] generic_perform_write+0x20a/0x4f0 [ 2680.390465] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2680.391954] ? down_write_killable+0x180/0x180 [ 2680.392898] ext4_buffered_write_iter+0x244/0x4d0 [ 2680.393880] ext4_file_write_iter+0xc11/0x18e0 [ 2680.394832] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2680.394946] 9pnet: Insufficient options for proto=fd [ 2680.395761] ? __lockdep_reset_lock+0x180/0x180 [ 2680.395796] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2680.398718] ? SOFTIRQ_verbose+0x10/0x10 [ 2680.399556] new_sync_write+0x42c/0x660 [ 2680.400375] ? new_sync_read+0x6f0/0x6f0 [ 2680.401203] ? ksys_write+0x12d/0x260 [ 2680.401990] ? lock_release+0x6b0/0x6b0 [ 2680.402802] ? selinux_file_permission+0x36/0x510 [ 2680.403790] ? __fget_files+0x296/0x480 [ 2680.404654] vfs_write+0x747/0xa30 [ 2680.405385] ksys_write+0x12d/0x260 [ 2680.406132] ? __ia32_sys_read+0xb0/0xb0 [ 2680.406966] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2680.408047] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2680.409098] do_syscall_64+0x33/0x40 [ 2680.409856] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2680.410896] RIP: 0033:0x7f06a9247b19 [ 2680.411656] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2680.415398] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2680.416945] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2680.418384] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2680.419820] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2680.421277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2680.422716] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:35:33 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:33 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 46) 03:35:33 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000300)={&(0x7f0000000080)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000240)="09654c747df9091b2a93626d370ee091556e7de1e9b10a03298a6aee121339ae7434b2151bff308b3996be55221c5cd757fe2f8a5d3cb697b96d6f3a3ffbc7ea9c52c9039dff", 0x46}, {&(0x7f0000000100)="b227", 0x2}, {&(0x7f0000000180)="471005bb640f8a0ae17c2004b441cc8205b9a718cf5ae6ab66", 0x19}], 0x3, 0x0, 0x0, 0xc004}, 0x4001) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0xeeb738ae5316cb58, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/405, @ANYRES64, @ANYBLOB="2c776602000000", @ANYRESHEX=r1]) 03:35:33 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2, 0x0, 0x0, 0x9b8c6d, &(0x7f0000000140)=ANY=[@ANYRES32=r0]) 03:35:33 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x7e, @mcast1, 0xfffffffd}}, {{0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r2, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) pidfd_getfd(r2, r0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) epoll_create(0x20) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000001080)) 03:35:33 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:33 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2696.012826] 9pnet: Insufficient options for proto=fd 03:35:33 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:33 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:33 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x11e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:33 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000180)="8ad5a0be1741a3173d5230e0a22de191d45d0f6971bd7e10875fd1e47530dfdcb6452870a6abff749515e596be1b887584ad0c07220e3ddbae92cd8f279c0b378a0c7e9700cef5d47572e0d5796d0b13d12bd7dbddd9559588f8f571e1ea5a84749bae9d0f4b09e9edfd5ce4f51ebb7bb0db4c9edc84ecbce5e86e15705ecae8d19aa372fe83065140288e754137c1f6e86203b17f40e12ab1b5c7750ed362f3d743dc5b74e9c025f1f74159a474755432750a4886415d4a8291da44157505a4b3a35c1f03dc4d3ea5ca9159683865a3a1ae822062e3b8f79ea75e9be2ed68d96b5c15a1340433675ef81dd574c92796f2742c", 0xf3, 0x8b33}, {&(0x7f0000000280)="9ad6c5af2e7dcd3b7b1815686c1af5629104b2420bed149cad58bb370a748b8494054028f411a470fdb03ca9cc6a8429ea1db35403dbc9bad38bb1e16c538d3fd027164ced8927cd522b9e2c8344785e63a483ce82aa32006f9897dda3ae53279f2e2b188556147ba576184517146c3fcd77c88d92354312abd1a14caa9cc7b669eb99ea97eec4a00c6c915b523554be0ee8418c348e", 0x96, 0x101}, {&(0x7f0000000340)="c994d2c3b384fb9ac35120ec03583a9e20334186fda8e20c120136e5b0e16dbf426a2daebeb89c808d95ad07c64d3b946e36f39ede582cfcce86f2967655d10a82c462f1b2797e343441127d38754fa07485d24da065634aa3e365eae30c4d1d29cfc4931a5fa2e58e5706c7ee2fc6889e2d495b8565849a095100e177879fd5ab4ce82d83cd96e33f8c6de4d1554d4537d89622a9577522e002500d839646073d99e3055e858888ac738c281e7ee80cc1885c0af4ab7c90b9", 0xb9, 0x2d3cb02b}], 0x2400, &(0x7f00000005c0)={[{@errors_remount}, {@acl}, {@jqfmt_vfsv1}, {@block_validity}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x800}}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x1}}, {@journal_dev={'journal_dev', 0x3d, 0x8}}, {@lazytime}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}, {@init_itable}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/\'/'}}, {@context={'context', 0x3d, 'system_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x35, 0x65, 0x35, 0x38, 0x35, 0x63, 0x35], 0x2d, [0x62, 0x39, 0x31, 0x36], 0x2d, [0x65, 0x31, 0x32, 0x35], 0x2d, [0x39, 0x33, 0x66, 0x64], 0x2d, [0x64, 0x61, 0x52, 0x64, 0x32, 0x31, 0x65, 0x38]}}}]}) [ 2696.153402] EXT4-fs (sda): test_dummy_encryption option not supported [ 2696.171970] EXT4-fs (sda): test_dummy_encryption option not supported [ 2696.204749] FAULT_INJECTION: forcing a failure. [ 2696.204749] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2696.207434] CPU: 1 PID: 40150 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2696.208834] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2696.210469] Call Trace: [ 2696.211001] dump_stack+0x107/0x167 [ 2696.211732] should_fail.cold+0x5/0xa [ 2696.212519] __alloc_pages_nodemask+0x182/0x680 [ 2696.213455] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 2696.214637] ? xas_load+0x66/0x2c0 [ 2696.215351] ? find_get_entry+0x2d9/0x6e0 [ 2696.216192] alloc_pages_current+0x187/0x280 [ 2696.217066] __page_cache_alloc+0x2d2/0x360 [ 2696.217917] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2696.218961] pagecache_get_page+0x2c7/0xc80 [ 2696.219844] ? asm_exc_page_fault+0x1e/0x30 [ 2696.220725] grab_cache_page_write_begin+0x64/0xa0 [ 2696.221763] ext4_da_write_begin+0x2f3/0xdf0 [ 2696.222653] ? iov_iter_fault_in_readable+0x1f7/0x410 [ 2696.223694] ? ext4_write_begin+0x1180/0x1180 [ 2696.224589] ? copyout_mc+0x140/0x140 [ 2696.225364] generic_perform_write+0x20a/0x4f0 [ 2696.226294] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2696.227736] ? down_write_killable+0x180/0x180 [ 2696.228664] ext4_buffered_write_iter+0x244/0x4d0 [ 2696.229632] ext4_file_write_iter+0xc11/0x18e0 [ 2696.230553] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2696.231464] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2696.232443] new_sync_write+0x42c/0x660 [ 2696.233244] ? new_sync_read+0x6f0/0x6f0 [ 2696.234106] ? lock_release+0x6b0/0x6b0 [ 2696.234901] ? selinux_file_permission+0x36/0x510 [ 2696.235935] ? __fget_files+0x296/0x480 [ 2696.236823] vfs_write+0x747/0xa30 [ 2696.237589] ksys_write+0x12d/0x260 [ 2696.238360] ? __ia32_sys_read+0xb0/0xb0 [ 2696.239224] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2696.240368] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2696.241480] do_syscall_64+0x33/0x40 [ 2696.242269] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2696.243321] RIP: 0033:0x7f06a9247b19 [ 2696.244079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2696.247831] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2696.249390] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2696.250846] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2696.252308] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2696.253756] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2696.255209] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:35:49 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2712.435437] 9pnet: Insufficient options for proto=fd 03:35:49 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 47) 03:35:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f0000000080)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX]) 03:35:49 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:49 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x7e, @mcast1, 0xfffffffd}}, {{0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r2, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) pidfd_getfd(r2, r0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) epoll_create(0x20) 03:35:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f00000010c0)='./file0/file0\x00', 0x20000000001, 0x0, 0x0, 0x2a8011, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r0, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) syz_mount_image$ext4(&(0x7f0000002880)='ext2\x00', &(0x7f0000001080)='./file0/../file0\x00', 0x1, 0x0, 0x0, 0x8bcc6c, &(0x7f00000000c0)=ANY=[@ANYRES16]) 03:35:49 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2712.462890] 9pnet: Insufficient options for proto=fd 03:35:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:49 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:49 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3f9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2712.513675] FAULT_INJECTION: forcing a failure. [ 2712.513675] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2712.515121] CPU: 0 PID: 40291 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2712.515868] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2712.516781] Call Trace: [ 2712.517075] dump_stack+0x107/0x167 [ 2712.517489] should_fail.cold+0x5/0xa [ 2712.517922] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2712.518521] generic_perform_write+0x279/0x4f0 [ 2712.519035] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2712.519833] ? down_write_killable+0x180/0x180 [ 2712.520337] ext4_buffered_write_iter+0x244/0x4d0 [ 2712.520879] ext4_file_write_iter+0xc11/0x18e0 [ 2712.521405] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2712.521895] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2712.522486] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2712.523068] ? trace_hardirqs_on+0x5b/0x180 [ 2712.523544] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2712.524132] new_sync_write+0x42c/0x660 [ 2712.524567] ? new_sync_read+0x6f0/0x6f0 [ 2712.525011] ? lock_release+0x6b0/0x6b0 [ 2712.525461] ? selinux_file_permission+0x36/0x510 [ 2712.525993] ? __fget_files+0x296/0x480 [ 2712.526427] vfs_write+0x747/0xa30 [ 2712.526817] ksys_write+0x12d/0x260 [ 2712.527215] ? __ia32_sys_read+0xb0/0xb0 [ 2712.527674] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2712.528262] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2712.528830] do_syscall_64+0x33/0x40 [ 2712.529249] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2712.529791] RIP: 0033:0x7f06a9247b19 [ 2712.530215] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2712.532192] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2712.533018] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2712.533791] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2712.534562] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2712.535331] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2712.536138] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:35:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x9bcc6c, &(0x7f00000000c0)=ANY=[]) 03:35:49 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2712.585839] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:35:49 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x7e, @mcast1, 0xfffffffd}}, {{0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r2, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) pidfd_getfd(r2, r0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) 03:35:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000100)='./file1\x00', &(0x7f0000000000), 0x2140c84, &(0x7f0000000080)=ANY=[@ANYBLOB="6c6e830201042c72660400000000000000eaf3428e81ef0de89a13c352f7333e22f752eb29c931cee865000000000000", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 2712.596793] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2712.663474] 9pnet: Insufficient options for proto=fd 03:35:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r0, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000011c0)={0x0, 0x2, 0xeba, 0x100000000}) getxattr(&(0x7f0000001080)='./file1\x00', &(0x7f0000001200)=ANY=[@ANYBLOB="6b7275737465442e657874340026e34158ba9776b38eb7c65da8f4dac7c2c99412"], &(0x7f0000001100)=""/137, 0x89) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f00000000c0)='./file0/../file0\x00', 0x800000000, 0x0, 0x0, 0x8acc6c, &(0x7f0000001080)=ANY=[]) 03:35:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2712.805334] EXT4-fs (sda): Unrecognized mount option "./file1" or missing value [ 2712.821414] EXT4-fs (sda): Unrecognized mount option "./file1" or missing value 03:36:08 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x5084, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB="7465514476514cfb95e28bdda3"]) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000140)={{0x5, 0xaa}, 0x100, './file0/../file0\x00'}) 03:36:08 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:36:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1e01000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:36:08 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 48) 03:36:08 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:36:08 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:36:08 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x7e, @mcast1, 0xfffffffd}}, {{0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r2, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) pidfd_getfd(r2, r0, 0x0) 03:36:08 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) [ 2731.338827] 9pnet: Insufficient options for proto=fd 03:36:08 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x7e, @mcast1, 0xfffffffd}}, {{0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r1, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) 03:36:08 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:36:08 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:36:08 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:36:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:36:08 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x3, 0x0, 0x0, 0x80020, &(0x7f0000000580)=ANY=[]) [ 2731.510769] 9pnet: Insufficient options for proto=fd [ 2731.519844] FAULT_INJECTION: forcing a failure. [ 2731.519844] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2731.522691] CPU: 1 PID: 40545 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2731.523812] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2731.525172] Call Trace: [ 2731.525610] dump_stack+0x107/0x167 [ 2731.526227] should_fail.cold+0x5/0xa [ 2731.526857] __alloc_pages_nodemask+0x182/0x680 [ 2731.527618] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 2731.528577] ? xas_load+0x66/0x2c0 [ 2731.529172] ? find_get_entry+0x2d9/0x6e0 [ 2731.529846] alloc_pages_current+0x187/0x280 [ 2731.530560] __page_cache_alloc+0x2d2/0x360 [ 2731.531273] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2731.532118] pagecache_get_page+0x2c7/0xc80 [ 2731.532846] ? asm_exc_page_fault+0x1e/0x30 [ 2731.533553] grab_cache_page_write_begin+0x64/0xa0 [ 2731.534345] ext4_da_write_begin+0x2f3/0xdf0 [ 2731.535059] ? iov_iter_fault_in_readable+0x1f7/0x410 [ 2731.535918] ? ext4_write_begin+0x1180/0x1180 [ 2731.536641] ? copyout_mc+0x140/0x140 [ 2731.537269] generic_perform_write+0x20a/0x4f0 [ 2731.538021] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2731.539182] ? down_write_killable+0x180/0x180 [ 2731.539925] ext4_buffered_write_iter+0x244/0x4d0 [ 2731.540711] ext4_file_write_iter+0xc11/0x18e0 [ 2731.541469] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2731.542202] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2731.543041] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2731.543878] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2731.544759] new_sync_write+0x42c/0x660 [ 2731.545396] ? new_sync_read+0x6f0/0x6f0 [ 2731.546045] ? ksys_write+0x12d/0x260 [ 2731.546668] ? lock_release+0x6b0/0x6b0 [ 2731.547315] ? selinux_file_permission+0x36/0x510 [ 2731.548116] vfs_write+0x747/0xa30 [ 2731.548701] ksys_write+0x12d/0x260 [ 2731.549278] ? __ia32_sys_read+0xb0/0xb0 [ 2731.549938] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2731.550769] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2731.551604] do_syscall_64+0x33/0x40 [ 2731.552203] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2731.553024] RIP: 0033:0x7f06a9247b19 [ 2731.553613] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2731.556508] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2731.557712] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2731.558863] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2731.559985] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2731.561138] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2731.562270] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 [ 2731.562674] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:36:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) r0 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r2, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x4000, &(0x7f0000001080)=ANY=[@ANYBLOB='tra|yQ~\nns=fd,r', @ANYRESHEX=r1, @ANYRESHEX=r0, @ANYRESDEC, @ANYRES16, @ANYRESOCT]) [ 2731.607697] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:36:08 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 49) 03:36:08 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:36:08 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:36:08 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x7e, @mcast1, 0xfffffffd}}, {{0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) pread64(0xffffffffffffffff, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) [ 2731.708265] 9pnet_virtio: no channels available for device 9p 03:36:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2731.751642] 9pnet: Insufficient options for proto=fd [ 2731.756859] FAULT_INJECTION: forcing a failure. [ 2731.756859] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2731.759718] CPU: 1 PID: 40666 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2731.760676] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2731.761827] Call Trace: [ 2731.762184] dump_stack+0x107/0x167 [ 2731.762683] should_fail.cold+0x5/0xa [ 2731.763222] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2731.763976] generic_perform_write+0x279/0x4f0 [ 2731.764623] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2731.765627] ? down_write_killable+0x180/0x180 [ 2731.766270] ext4_buffered_write_iter+0x244/0x4d0 [ 2731.766930] ext4_file_write_iter+0xc11/0x18e0 [ 2731.767551] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2731.768175] ? __lockdep_reset_lock+0x180/0x180 [ 2731.768813] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2731.769513] ? SOFTIRQ_verbose+0x10/0x10 [ 2731.770061] new_sync_write+0x42c/0x660 [ 2731.770587] ? new_sync_read+0x6f0/0x6f0 [ 2731.771146] ? ksys_write+0x12d/0x260 [ 2731.771648] ? lock_release+0x6b0/0x6b0 [ 2731.772172] ? selinux_file_permission+0x36/0x510 [ 2731.772833] ? __fget_files+0x296/0x480 [ 2731.773360] vfs_write+0x747/0xa30 [ 2731.773837] ksys_write+0x12d/0x260 [ 2731.774319] ? __ia32_sys_read+0xb0/0xb0 [ 2731.774878] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2731.775563] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2731.776272] do_syscall_64+0x33/0x40 [ 2731.776787] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2731.777479] RIP: 0033:0x7f06a9247b19 [ 2731.777969] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2731.780457] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2731.781494] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2731.782461] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2731.783431] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2731.784393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2731.785371] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:36:23 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 50) 03:36:23 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:36:23 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) r0 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') kcmp(r0, 0xffffffffffffffff, 0x5, r1, 0xffffffffffffffff) pread64(r1, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x7, 0x81, 0x7, 0x20, 0x0, 0x3, 0x80281, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x4, @perf_config_ext={0x10000}, 0x8, 0x1, 0x3, 0x4, 0x4, 0x0, 0x9, 0x0, 0x2a, 0x0, 0xc3}, r0, 0x0, r1, 0x3) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = openat$cgroup_pressure(r1, &(0x7f0000001140)='memory.pressure\x00', 0x2, 0x0) lseek(r3, 0x80, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) 03:36:23 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x7e, @mcast1, 0xfffffffd}}, {{0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) pread64(0xffffffffffffffff, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) 03:36:23 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)='/usr/sbin/cupsd\x00', 0x10, 0x7) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f00000001c0)=ANY=[@ANYBLOB="74a034b0298367353d9b4cc6910800000064756f6df95f65b8ff6539161683266e55b73ae6d440467d7419420e0c91bae665601d0f98f9874fdd095b3dfd931a8be5455c5d9ce02e6f07df8dd6a080991f2a3f3f48b0c33b8c5b319890a6149cdc75bd81ed317c1e36be85c0a42a95142dcd30a3a095d5a89f03f07303974471ffbce2ae813e8174d2b8afe82760e126b7b03e01049c99ce1243ee3fae0da2e00b49d04f5362a8d3469128b79f8684b020d44507678879f585a6e7e620"]) 03:36:23 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:36:23 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:36:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2746.722239] EXT4-fs (sda): Unrecognized mount option "t 4°)ƒg5=›LÆ‘" or missing value [ 2746.730593] 9pnet: Insufficient options for proto=fd [ 2746.761848] FAULT_INJECTION: forcing a failure. [ 2746.761848] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2746.764575] CPU: 0 PID: 40794 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2746.765401] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2746.766372] Call Trace: [ 2746.766709] dump_stack+0x107/0x167 [ 2746.767142] should_fail.cold+0x5/0xa [ 2746.767600] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2746.768249] generic_perform_write+0x279/0x4f0 [ 2746.768806] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2746.769684] ? down_write_killable+0x180/0x180 [ 2746.770236] ext4_buffered_write_iter+0x244/0x4d0 [ 2746.770795] ext4_file_write_iter+0xc11/0x18e0 [ 2746.771344] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2746.771879] ? __lockdep_reset_lock+0x180/0x180 [ 2746.772442] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2746.773105] ? SOFTIRQ_verbose+0x10/0x10 [ 2746.773606] new_sync_write+0x42c/0x660 [ 2746.774108] ? new_sync_read+0x6f0/0x6f0 [ 2746.774629] ? ksys_write+0x12d/0x260 [ 2746.775099] ? lock_release+0x6b0/0x6b0 [ 2746.775590] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2746.776282] vfs_write+0x747/0xa30 [ 2746.776741] ksys_write+0x12d/0x260 [ 2746.777210] ? __ia32_sys_read+0xb0/0xb0 [ 2746.777718] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2746.778389] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2746.779028] do_syscall_64+0x33/0x40 [ 2746.779500] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2746.780135] RIP: 0033:0x7f06a9247b19 [ 2746.780604] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2746.782933] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2746.783900] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2746.784811] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2746.785658] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2746.786547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2746.787439] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:36:23 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11e, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:36:23 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:36:23 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 51) 03:36:23 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf903000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2746.941809] FAULT_INJECTION: forcing a failure. [ 2746.941809] name failslab, interval 1, probability 0, space 0, times 0 [ 2746.943789] CPU: 0 PID: 40810 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2746.944577] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2746.945553] Call Trace: [ 2746.945860] dump_stack+0x107/0x167 [ 2746.946295] should_fail.cold+0x5/0xa [ 2746.946737] ? create_object.isra.0+0x3a/0xa20 [ 2746.947265] should_failslab+0x5/0x20 [ 2746.947715] kmem_cache_alloc+0x5b/0x360 [ 2746.948184] create_object.isra.0+0x3a/0xa20 [ 2746.948699] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2746.949294] kmem_cache_alloc+0x159/0x360 [ 2746.949783] alloc_buffer_head+0x20/0x110 [ 2746.950264] alloc_page_buffers+0x14d/0x6d0 [ 2746.950764] create_empty_buffers+0x2c/0x640 [ 2746.951277] ? start_this_handle+0xfdd/0x1390 [ 2746.951801] ? start_this_handle+0xd57/0x1390 [ 2746.952305] create_page_buffers+0x1bb/0x230 [ 2746.952808] __block_write_begin_int+0x1d1/0x19c0 [ 2746.953379] ? ext4_da_release_space+0x530/0x530 [ 2746.953895] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2746.954443] ? remove_inode_buffers+0x300/0x300 [ 2746.954968] ? jbd2__journal_start+0xf3/0x890 [ 2746.955491] ext4_da_write_begin+0x37d/0xdf0 [ 2746.956004] ? ext4_write_begin+0x1180/0x1180 [ 2746.956515] ? copyout_mc+0x140/0x140 [ 2746.957192] generic_perform_write+0x20a/0x4f0 [ 2746.958331] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2746.960100] ? down_write_killable+0x180/0x180 [ 2746.961262] ext4_buffered_write_iter+0x244/0x4d0 [ 2746.962354] ext4_file_write_iter+0xc11/0x18e0 [ 2746.963406] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2746.964437] ? __lockdep_reset_lock+0x180/0x180 [ 2746.965509] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2746.966672] ? SOFTIRQ_verbose+0x10/0x10 [ 2746.967603] new_sync_write+0x42c/0x660 [ 2746.968498] ? new_sync_read+0x6f0/0x6f0 [ 2746.969413] ? ksys_write+0x12d/0x260 [ 2746.970273] ? lock_release+0x6b0/0x6b0 [ 2746.971162] ? selinux_file_permission+0x36/0x510 [ 2746.972242] ? __fget_files+0x296/0x480 [ 2746.973164] vfs_write+0x747/0xa30 [ 2746.973885] ksys_write+0x12d/0x260 [ 2746.974690] ? __ia32_sys_read+0xb0/0xb0 [ 2746.975609] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2746.976782] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2746.977953] do_syscall_64+0x33/0x40 [ 2746.978807] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2746.979951] RIP: 0033:0x7f06a9247b19 [ 2746.980789] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2746.984903] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2746.986598] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2746.988187] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2746.989796] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2746.991389] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2746.992993] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:36:41 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x8000, 0x0, 0xeed0, 0x3, 0x401}) 03:36:41 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:36:41 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) (fail_nth: 52) 03:36:41 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1e01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:36:41 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x7e, @mcast1, 0xfffffffd}}, {{0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) pread64(0xffffffffffffffff, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) 03:36:41 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0xa988, 0x6, &(0x7f00000003c0)=[{&(0x7f0000000180)="2b62aa51ae32de26ee2a040d3f0f079d64e0cf2c72d5fb3a733f6afc2a185a028a8ec81137cd4851cd3af4", 0x2b, 0x2}, {&(0x7f00000001c0)="2563c4b14427fe59f2b9f9582bd36f1437e5fd06adc5aabba9206985b2003515b5120a6ede84a479d3d8d240cd05ed83823229ea00448f633061f9637ff56c9188b63943af71df393abdbd0a96a31609617ce141ef53c496b5a45a946ba4f9908e84885809d8235060eda220fbf7a97352cf7394edbf29e9c20e04630cf3bebd47f063e4103dcaf7b06e70d80376a0f9e29c1215a8", 0x95, 0x5}, {&(0x7f0000000280)="868be4b3d4b278f84a2b233968453963daa85ac8663a51b321b378ed0c7189ce8921c5bcad40dffe5d5d467051d38281d1", 0x31, 0x16}, {&(0x7f00000002c0), 0x0, 0x80}, {&(0x7f0000000300)="0c565b7649bcf54767a1f28c57bb0603e2ce", 0x12, 0x9}, {&(0x7f0000000340)="de9ec1cb8c45a05bd092253d599efa936848cedc245a54e48e29d1150adc8a283a7997cf3636e0b79d6caebf676449a2c9205ddd8593dc4a898d231c746641d4e2e087892dd3e61c6a65f1378b297b532c8ff73d0d8038501a9eb35db31f93c882ff28bab6f4434bba8b0049", 0x6c, 0x3}], 0x800800, &(0x7f0000000480)={[{':#\xda\\!$\\'}], [{@smackfsdef}, {@seclabel}, {@fsname={'fsname', 0x3d, 'ext4\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f0000002880)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encvyption']) 03:36:41 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfeffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:36:41 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2764.759691] 9pnet: Insufficient options for proto=fd [ 2764.763849] nfs4: Unknown parameter ':#Ú\!$\' [ 2764.789882] EXT4-fs (sda): Unrecognized mount option "test_dummy_encvyption" or missing value 03:36:41 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:36:41 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:36:41 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2b43675181938adb, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX]) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') pread64(r1, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) 03:36:41 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:36:41 executing program 2: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f9, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:36:41 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1f3442, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x9bcc6c, &(0x7f0000000580)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 2764.947833] FAULT_INJECTION: forcing a failure. [ 2764.947833] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2764.950732] CPU: 1 PID: 40822 Comm: syz-executor.5 Not tainted 5.10.165 #1 [ 2764.952142] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2764.953834] Call Trace: [ 2764.954383] dump_stack+0x107/0x167 [ 2764.955133] should_fail.cold+0x5/0xa [ 2764.955925] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 2764.957037] generic_perform_write+0x279/0x4f0 [ 2764.958007] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2764.959485] ? down_write_killable+0x180/0x180 [ 2764.960433] ext4_buffered_write_iter+0x244/0x4d0 [ 2764.961442] ext4_file_write_iter+0xc11/0x18e0 [ 2764.962394] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2764.962659] EXT4-fs (sda): test_dummy_encryption option not supported [ 2764.963334] ? new_sync_write+0x214/0x660 [ 2764.963365] new_sync_write+0x42c/0x660 [ 2764.965922] ? new_sync_read+0x6f0/0x6f0 [ 2764.965946] 9pnet: Insufficient options for proto=fd [ 2764.966780] ? lock_release+0x6b0/0x6b0 [ 2764.968326] vfs_write+0x747/0xa30 [ 2764.969086] ksys_write+0x12d/0x260 [ 2764.969848] ? __ia32_sys_read+0xb0/0xb0 [ 2764.970692] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2764.971783] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2764.972846] do_syscall_64+0x33/0x40 [ 2764.973614] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2764.974657] RIP: 0033:0x7f06a9247b19 [ 2764.975423] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2764.979164] RSP: 002b:00007f06a67bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2764.980718] RAX: ffffffffffffffda RBX: 00007f06a935af60 RCX: 00007f06a9247b19 [ 2764.982174] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 2764.983619] RBP: 00007f06a67bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2764.985072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2764.986535] R13: 00007ffc3509802f R14: 00007f06a67bd300 R15: 0000000000022000 03:36:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11e, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2765.003157] EXT4-fs (sda): test_dummy_encryption option not supported 03:36:42 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) VM DIAGNOSIS: 03:41:51 Registers: info registers vcpu 0 RAX=ffffffff83e334b0 RBX=ffffffff84e322c0 RCX=ffffffff83e1adfc RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e33873 RBP=fffffbfff09c6458 RSP=ffffffff84e07e40 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85671cc8 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e334be RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f0b7ada6010 CR3=000000000d2c2000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000010000000000000001 XMM02=000000000000000040fdbc8000000000 XMM03=0000060101a003531afc0101039aff0f XMM04=657320636578650a006873616d732063 XMM05=696d696e696d20636578650d00736465 XMM06=110073746e696820636578650a00657a XMM07=7472617473657220726f747563657865 XMM08=6e6567206365786508006c61746f7420 XMM09=78650a006873616d7320636578650a00 XMM10=6d20636578650d007364656573206365 XMM11=696820636578650a00657a696d696e69 XMM12=657220726f747563657865110073746e XMM13=7a756620636578650900737472617473 XMM14=74616469646e616320636578650e007a XMM15=000065676169727420636578650b0065 info registers vcpu 1 RAX=ffffffff83e334b0 RBX=ffff888008568000 RCX=ffffffff83e1adfc RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e33873 RBP=ffffed10010ad000 RSP=ffff88800857fe78 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85671cc8 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e334be RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f827b509830 CR3=000000000d2c2000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000bfe62e42fefa39ef XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000