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"]) 12:22:27 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) [ 76.515398][ T3294] should_fail+0x23c/0x250 [ 76.519823][ T3294] ? vfs_parse_fs_string+0x6d/0xd0 [ 76.524946][ T3294] __should_failslab+0x81/0x90 [ 76.529766][ T3294] should_failslab+0x5/0x20 [ 76.534336][ T3294] __kmalloc_track_caller+0x6d/0x370 [ 76.539631][ T3294] kmemdup_nul+0x27/0x70 [ 76.543883][ T3294] vfs_parse_fs_string+0x6d/0xd0 [ 76.548828][ T3294] path_mount+0xf94/0x1c40 [ 76.553270][ T3294] ? kmem_cache_free+0x65/0x110 [ 76.558169][ T3294] __se_sys_mount+0x24b/0x2f0 [ 76.563022][ T3294] __x64_sys_mount+0x63/0x70 [ 76.567618][ T3294] do_syscall_64+0x44/0xd0 [ 76.572064][ T3294] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 76.577986][ T3294] RIP: 0033:0x7fd6e4cc0fe9 [ 76.582469][ T3294] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 76.602201][ T3294] RSP: 002b:00007fd6e3e37168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 76.610606][ T3294] RAX: ffffffffffffffda RBX: 00007fd6e4dd3f60 RCX: 00007fd6e4cc0fe9 [ 76.618589][ T3294] RDX: 0000000020000080 RSI: 0000000020000140 RDI: 00000000200001c0 [ 76.626603][ T3294] RBP: 00007fd6e3e371d0 R08: 0000000000000000 R09: 0000000000000000 [ 76.634644][ T3294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 76.642592][ T3294] R13: 00007ffc26d7877f R14: 00007fd6e3e37300 R15: 0000000000022000 [ 76.650551][ T3294] 12:22:27 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:27 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (fail_nth: 10) 12:22:27 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) [ 76.678028][ T3305] No source specified 12:22:27 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:27 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:27 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:27 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) [ 76.716322][ T3315] FAULT_INJECTION: forcing a failure. [ 76.716322][ T3315] name failslab, interval 1, probability 0, space 0, times 0 [ 76.728983][ T3315] CPU: 1 PID: 3315 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 76.737360][ T3315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 76.747411][ T3315] Call Trace: [ 76.750686][ T3315] [ 76.753608][ T3315] dump_stack_lvl+0xd6/0x122 [ 76.758214][ T3315] dump_stack+0x11/0x1b 12:22:27 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:27 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) [ 76.762379][ T3315] should_fail+0x23c/0x250 [ 76.766913][ T3315] ? isofs_mount+0x40/0x40 [ 76.771768][ T3315] ? getname_kernel+0x37/0x1d0 [ 76.776619][ T3315] __should_failslab+0x81/0x90 [ 76.778382][ T3316] No source specified [ 76.781386][ T3315] should_failslab+0x5/0x20 [ 76.789858][ T3315] kmem_cache_alloc+0x4f/0x320 [ 76.794699][ T3315] ? avc_has_perm_noaudit+0x1c0/0x270 [ 76.800072][ T3315] ? isofs_mount+0x40/0x40 [ 76.804560][ T3315] getname_kernel+0x37/0x1d0 [ 76.809161][ T3315] ? isofs_mount+0x40/0x40 12:22:27 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:27 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) [ 76.813587][ T3315] kern_path+0x1d/0x100 [ 76.817802][ T3315] ? isofs_mount+0x40/0x40 [ 76.822234][ T3315] blkdev_get_by_path+0x63/0x220 [ 76.827175][ T3315] mount_bdev+0x47/0x290 [ 76.831495][ T3315] ? _isofs_bmap+0x30/0x30 [ 76.835934][ T3315] isofs_mount+0x2d/0x40 [ 76.840199][ T3315] legacy_get_tree+0x70/0xc0 [ 76.844881][ T3315] vfs_get_tree+0x4a/0x1a0 [ 76.849671][ T3315] path_mount+0x11cf/0x1c40 [ 76.854247][ T3315] ? kmem_cache_free+0x65/0x110 [ 76.859165][ T3315] __se_sys_mount+0x24b/0x2f0 [ 76.863824][ T3315] __x64_sys_mount+0x63/0x70 [ 76.868394][ T3315] do_syscall_64+0x44/0xd0 [ 76.872802][ T3315] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 76.878714][ T3315] RIP: 0033:0x7fd6e4cc0fe9 [ 76.883154][ T3315] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 76.902746][ T3315] RSP: 002b:00007fd6e3e37168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 12:22:27 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (fail_nth: 11) [ 76.911414][ T3315] RAX: ffffffffffffffda RBX: 00007fd6e4dd3f60 RCX: 00007fd6e4cc0fe9 [ 76.919366][ T3315] RDX: 0000000020000080 RSI: 0000000020000140 RDI: 00000000200001c0 [ 76.927319][ T3315] RBP: 00007fd6e3e371d0 R08: 0000000000000000 R09: 0000000000000000 [ 76.935268][ T3315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 76.943219][ T3315] R13: 00007ffc26d7877f R14: 00007fd6e3e37300 R15: 0000000000022000 [ 76.951179][ T3315] 12:22:27 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) [ 76.980494][ T3329] No source specified 12:22:27 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [], 0x9, "23cc9bcea5f644"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r3, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r2, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:27 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, 0x0) 12:22:27 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) [ 77.001146][ T3334] FAULT_INJECTION: forcing a failure. [ 77.001146][ T3334] name failslab, interval 1, probability 0, space 0, times 0 [ 77.014023][ T3334] CPU: 1 PID: 3334 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 77.022355][ T3334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 77.032488][ T3334] Call Trace: [ 77.035770][ T3334] [ 77.038701][ T3334] dump_stack_lvl+0xd6/0x122 [ 77.043396][ T3334] dump_stack+0x11/0x1b 12:22:27 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:27 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) [ 77.047613][ T3334] should_fail+0x23c/0x250 [ 77.052069][ T3334] ? __d_alloc+0x36/0x370 [ 77.056399][ T3334] __should_failslab+0x81/0x90 [ 77.061177][ T3334] should_failslab+0x5/0x20 [ 77.065748][ T3334] kmem_cache_alloc+0x4f/0x320 [ 77.070519][ T3334] __d_alloc+0x36/0x370 [ 77.074665][ T3334] d_alloc_parallel+0x51/0xd00 [ 77.079410][ T3334] ? __rcu_read_unlock+0x5c/0x290 [ 77.084459][ T3334] ? lockref_get_not_dead+0xf2/0x1a0 [ 77.089769][ T3334] ? try_to_unlazy+0x3c1/0x650 [ 77.094512][ T3334] ? __down_read_common+0x161/0x4b0 [ 77.099691][ T3334] __lookup_slow+0x80/0x250 [ 77.104173][ T3334] walk_component+0x2b6/0x360 [ 77.108903][ T3334] path_lookupat+0x12d/0x3d0 [ 77.113476][ T3334] filename_lookup+0x130/0x310 [ 77.118244][ T3334] kern_path+0x35/0x100 [ 77.122435][ T3334] ? isofs_mount+0x40/0x40 [ 77.126835][ T3334] blkdev_get_by_path+0x63/0x220 [ 77.131842][ T3334] mount_bdev+0x47/0x290 [ 77.136193][ T3334] ? _isofs_bmap+0x30/0x30 [ 77.140610][ T3334] isofs_mount+0x2d/0x40 [ 77.144860][ T3334] legacy_get_tree+0x70/0xc0 [ 77.149542][ T3334] vfs_get_tree+0x4a/0x1a0 [ 77.154021][ T3334] path_mount+0x11cf/0x1c40 [ 77.158507][ T3334] ? kmem_cache_free+0x65/0x110 [ 77.163343][ T3334] __se_sys_mount+0x24b/0x2f0 [ 77.168070][ T3334] __x64_sys_mount+0x63/0x70 [ 77.172685][ T3334] do_syscall_64+0x44/0xd0 [ 77.177086][ T3334] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 77.182983][ T3334] RIP: 0033:0x7fd6e4cc0fe9 [ 77.187382][ T3334] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 77.207038][ T3334] RSP: 002b:00007fd6e3e37168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 77.215443][ T3334] RAX: ffffffffffffffda RBX: 00007fd6e4dd3f60 RCX: 00007fd6e4cc0fe9 [ 77.223412][ T3334] RDX: 0000000020000080 RSI: 0000000020000140 RDI: 00000000200001c0 [ 77.231368][ T3334] RBP: 00007fd6e3e371d0 R08: 0000000000000000 R09: 0000000000000000 [ 77.239502][ T3334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 12:22:28 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (fail_nth: 12) 12:22:28 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, 0x0) [ 77.247456][ T3334] R13: 00007ffc26d7877f R14: 00007fd6e3e37300 R15: 0000000000022000 [ 77.255426][ T3334] [ 77.299322][ T3348] FAULT_INJECTION: forcing a failure. [ 77.299322][ T3348] name failslab, interval 1, probability 0, space 0, times 0 [ 77.312154][ T3348] CPU: 1 PID: 3348 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 77.320494][ T3348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 77.330619][ T3348] Call Trace: [ 77.334007][ T3348] [ 77.336998][ T3348] dump_stack_lvl+0xd6/0x122 [ 77.341594][ T3348] dump_stack+0x11/0x1b 12:22:28 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, 0x0) 12:22:28 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r9, &(0x7f0000001240)=""/102400, 0x200000, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [], 0x9, "23cc9bcea5f644"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r3, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r2, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) [ 77.345751][ T3348] should_fail+0x23c/0x250 [ 77.350208][ T3348] ? __d_alloc+0x36/0x370 [ 77.354560][ T3348] __should_failslab+0x81/0x90 [ 77.359428][ T3348] should_failslab+0x5/0x20 [ 77.363929][ T3348] kmem_cache_alloc+0x4f/0x320 [ 77.368697][ T3348] __d_alloc+0x36/0x370 [ 77.372881][ T3348] d_alloc_parallel+0x51/0xd00 [ 77.377622][ T3348] ? __rcu_read_unlock+0x5c/0x290 [ 77.382677][ T3348] ? lockref_get_not_dead+0xf2/0x1a0 [ 77.387944][ T3348] ? try_to_unlazy+0x3c1/0x650 [ 77.392690][ T3348] ? __down_read_common+0x161/0x4b0 [ 77.397933][ T3348] __lookup_slow+0x80/0x250 [ 77.402423][ T3348] walk_component+0x2b6/0x360 [ 77.407677][ T3348] path_lookupat+0x12d/0x3d0 [ 77.412306][ T3348] filename_lookup+0x130/0x310 [ 77.417157][ T3348] kern_path+0x35/0x100 [ 77.421314][ T3348] ? isofs_mount+0x40/0x40 [ 77.425768][ T3348] blkdev_get_by_path+0x63/0x220 [ 77.430687][ T3348] mount_bdev+0x47/0x290 [ 77.434937][ T3348] ? _isofs_bmap+0x30/0x30 [ 77.439336][ T3348] isofs_mount+0x2d/0x40 [ 77.443560][ T3348] legacy_get_tree+0x70/0xc0 [ 77.448136][ T3348] vfs_get_tree+0x4a/0x1a0 [ 77.452534][ T3348] path_mount+0x11cf/0x1c40 [ 77.457025][ T3348] ? kmem_cache_free+0x65/0x110 [ 77.461878][ T3348] __se_sys_mount+0x24b/0x2f0 [ 77.466535][ T3348] __x64_sys_mount+0x63/0x70 [ 77.471186][ T3348] do_syscall_64+0x44/0xd0 [ 77.475604][ T3348] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 77.481486][ T3348] RIP: 0033:0x7fd6e4cc0fe9 [ 77.485879][ T3348] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 77.505465][ T3348] RSP: 002b:00007fd6e3e37168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 77.513858][ T3348] RAX: ffffffffffffffda RBX: 00007fd6e4dd3f60 RCX: 00007fd6e4cc0fe9 [ 77.521815][ T3348] RDX: 0000000020000080 RSI: 0000000020000140 RDI: 00000000200001c0 [ 77.529772][ T3348] RBP: 00007fd6e3e371d0 R08: 0000000000000000 R09: 0000000000000000 [ 77.537816][ T3348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 12:22:28 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (fail_nth: 13) 12:22:28 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) [ 77.545791][ T3348] R13: 00007ffc26d7877f R14: 00007fd6e3e37300 R15: 0000000000022000 [ 77.553769][ T3348] 12:22:28 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [], 0x9, "23cc9bcea5f644"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r3, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r2, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) [ 77.608041][ T3364] FAULT_INJECTION: forcing a failure. [ 77.608041][ T3364] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 77.621140][ T3364] CPU: 1 PID: 3364 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 77.629571][ T3364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 77.639676][ T3364] Call Trace: [ 77.642957][ T3364] [ 77.645973][ T3364] dump_stack_lvl+0xd6/0x122 [ 77.650577][ T3364] dump_stack+0x11/0x1b 12:22:28 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [], 0x9, "23cc9bcea5f644"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:28 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) [ 77.654758][ T3364] should_fail+0x23c/0x250 [ 77.659191][ T3364] should_fail_usercopy+0x16/0x20 [ 77.664297][ T3364] _copy_from_user+0x1c/0xd0 [ 77.668927][ T3364] kstrtouint_from_user+0x7e/0x170 [ 77.674097][ T3364] proc_fail_nth_write+0x4b/0x150 [ 77.679211][ T3364] ? proc_fail_nth_read+0x150/0x150 [ 77.684433][ T3364] vfs_write+0x2af/0x950 [ 77.688678][ T3364] ? __fget_files+0x1d2/0x210 [ 77.693367][ T3364] ksys_write+0xd9/0x190 [ 77.697618][ T3364] __x64_sys_write+0x3e/0x50 [ 77.702213][ T3364] do_syscall_64+0x44/0xd0 [ 77.706698][ T3364] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 77.712613][ T3364] RIP: 0033:0x7fd6e4c73aff [ 77.717022][ T3364] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 77.736725][ T3364] RSP: 002b:00007fd6e3e37160 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 77.745198][ T3364] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd6e4c73aff 12:22:28 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) 12:22:28 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) [ 77.753149][ T3364] RDX: 0000000000000001 RSI: 00007fd6e3e371e0 RDI: 0000000000000003 [ 77.761138][ T3364] RBP: 00007fd6e3e371d0 R08: 0000000000000000 R09: 0000000000000000 [ 77.769090][ T3364] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 77.777070][ T3364] R13: 00007ffc26d7877f R14: 00007fd6e3e37300 R15: 0000000000022000 [ 77.785038][ T3364] 12:22:28 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='//f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) 12:22:28 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [], 0x9, "23cc9bcea5f644"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:28 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:28 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 2: mkdir(0x0, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:28 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./.'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) 12:22:28 executing program 5: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='.//'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) 12:22:28 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 2: mkdir(0x0, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 5: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x2, 0x0) 12:22:28 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 2: mkdir(0x0, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x1020, 0x0) 12:22:28 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 5: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x181b, 0x0) 12:22:28 executing program 5: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r9, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x1b18, 0x0) 12:22:28 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x2010, 0x0) 12:22:28 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:28 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:29 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r9, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0xedc0, 0x0) 12:22:29 executing program 5: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:29 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 5: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r9, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) [ 78.229357][ T3460] ======================================================= [ 78.229357][ T3460] WARNING: The mand mount option has been deprecated and [ 78.229357][ T3460] and is ignored by this kernel. Remove the mand [ 78.229357][ T3460] option from the mount to silence this warning. [ 78.229357][ T3460] ======================================================= 12:22:29 executing program 5: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x80040, 0x0) 12:22:29 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x1000000, 0x0) 12:22:29 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0xedc0, 0x0) 12:22:29 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x2000000, 0x0) 12:22:29 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:29 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:29 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x1b180000, 0x0) 12:22:29 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:29 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:29 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r9, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r2, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [], 0x9, "23cc9bcea5f644"}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:29 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:29 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x20100000, 0x0) 12:22:29 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r9, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r2, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x40000800, 0x0) 12:22:29 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r9, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r2, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:29 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:29 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x8cffffff, 0x0) 12:22:29 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:29 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0xc0ed0000, 0x0) 12:22:29 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r9, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r2, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0xf6ffffff, 0x0) 12:22:29 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) [ 78.828613][ T3579] No source specified 12:22:29 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r9, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r2, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:29 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0xf9fdffff, 0x0) 12:22:29 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) [ 78.884801][ T3593] No source specified 12:22:29 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r9, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r2, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0xfffffdf9, 0x0) 12:22:29 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) [ 78.950180][ T3608] No source specified 12:22:29 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, 0x0) 12:22:29 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0xffffff8c, 0x0) 12:22:29 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:29 executing program 1: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r9, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r2, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:29 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:29 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0xfffffff6, 0x0) 12:22:29 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, 0x0) 12:22:29 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 1: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, 0x0) 12:22:29 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x8000000000, 0x0) 12:22:29 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r9, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r2, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:29 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 1: mkdir(0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0xedc000000000, 0x0) 12:22:29 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:29 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r9, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r2, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:29 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:29 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x100000000000000, 0x0) [ 79.150407][ T3650] No source specified 12:22:30 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:30 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:30 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000300)=ANY=[]) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r9, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r2, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:30 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x200000000000000, 0x0) 12:22:30 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:30 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:30 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:30 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) [ 79.244903][ T3670] No source specified 12:22:30 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x1b18000000000000, 0x0) 12:22:30 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000300)=ANY=[]) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r9, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r2, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:30 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:30 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:30 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:30 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x2010000000000000, 0x0) [ 79.309204][ T3682] No source specified 12:22:30 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, 0x0) 12:22:30 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:30 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000300)=ANY=[]) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r9, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r2, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:30 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:30 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:30 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, 0x0) 12:22:30 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:30 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x4000080000000000, 0x0) 12:22:30 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, 0x0) 12:22:30 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x8cffffff00000000, 0x0) 12:22:30 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:30 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:30 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:30 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 1) 12:22:30 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:30 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0xf6ffffff00000000, 0x0) 12:22:30 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:30 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 1) 12:22:30 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:30 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 1) 12:22:30 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0xf9fdffff00000000, 0x0) [ 79.503344][ T3721] FAULT_INJECTION: forcing a failure. [ 79.503344][ T3721] name failslab, interval 1, probability 0, space 0, times 0 [ 79.516113][ T3721] CPU: 1 PID: 3721 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller #0 [ 79.524489][ T3721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 79.534543][ T3721] Call Trace: [ 79.537820][ T3721] [ 79.540746][ T3721] dump_stack_lvl+0xd6/0x122 [ 79.545347][ T3721] dump_stack+0x11/0x1b 12:22:30 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0xffffffff00000000, 0x0) 12:22:30 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) [ 79.549532][ T3721] should_fail+0x23c/0x250 [ 79.553954][ T3721] ? getname_flags+0x84/0x3f0 [ 79.558720][ T3721] __should_failslab+0x81/0x90 [ 79.563500][ T3721] should_failslab+0x5/0x20 [ 79.568025][ T3721] kmem_cache_alloc+0x4f/0x320 [ 79.572841][ T3721] getname_flags+0x84/0x3f0 [ 79.577347][ T3721] __x64_sys_mkdir+0x31/0x50 [ 79.582000][ T3721] do_syscall_64+0x44/0xd0 [ 79.586429][ T3721] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 79.592336][ T3721] RIP: 0033:0x7f70509450f7 12:22:30 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:30 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) [ 79.596787][ T3721] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 79.616393][ T3721] RSP: 002b:00007f704fabbf88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 79.624808][ T3721] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f70509450f7 [ 79.632831][ T3721] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000000 [ 79.640805][ T3721] RBP: 00007f704fabc020 R08: 0000000000000000 R09: 000000000001c4a6 [ 79.648757][ T3721] R10: 00000000200000c0 R11: 0000000000000246 R12: 00000000200000c0 [ 79.656786][ T3721] R13: 0000000020000000 R14: 00007f704fabbfe0 R15: 000000002001b240 [ 79.664758][ T3721] [ 79.674105][ T3736] FAULT_INJECTION: forcing a failure. [ 79.674105][ T3736] name failslab, interval 1, probability 0, space 0, times 0 [ 79.686758][ T3736] CPU: 1 PID: 3736 Comm: syz-executor.5 Not tainted 5.16.0-syzkaller #0 12:22:30 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 2) 12:22:30 executing program 4: sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000001d00)={&(0x7f0000001c40)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001cc0)={&(0x7f0000001c80)={0x2c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x42044) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000001bc0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3c6834a50ac4f9d00c46fafa67", 0xd}, {&(0x7f0000000200)="d56e8a905d387a074fc0bfe30af5ec9c68b9e323d7f1c5dbd65e6f22fd568804b09dfdc4f58a41d73f0c744da87cb8771d4161a7784148ea3bf64c7e329fad362be9a5741051e4f44d35d01523ac2e72f41dda272570e3d4d44f9a504f907e3012303e791c6db359e8923733c74f6c5a00fb6d7be8f2fd735749ae251feb631e54a66c0ee1d369c2adb4dcf370ef9445fb64a42c05372b15cb7e12d03c11eae5b4e34f25e4b9050891f06ebcdddec7de556cd6177d222219acce4e4911248a52815c1402bc7e3be5356116fcefca31a1961cf9d2e4f241c4939cdfbe", 0xdc}, {&(0x7f0000000300)="7e7fdfc926e20d0181705ed11fa4530a41d04cbb4101de89e7de00aeab5bcffbf216b635f9bcfcd3b121cbb4921762b904530d0f15efa4088b8f276da374ad3a63c76ad03f1900885aea5e8748206ffb05da203dad8a1b46be53642ea258aae7a1f60ae84b60f4ea0be80cd7baf0b2fe1c43e8b73cbd3daf2f3bc07dc2c1f9463c062f8311a0633f99ca", 0x8a}, {&(0x7f00000003c0)="641363d793899557c10dc57d8d1b1c70657061faa959438850aed7a501b0a276d23bc61fa013f38cfddb6d72c3de9cd74615646780b09c9cc2eb5b4adc29451a61438669c327f38ae435d48ddb5085ce9ee42b566a8137f5c9321fe2379238630a711b683c8321960a6b32cd806f7ddf6f847cbbee8769192f9da2310e898220e3d0e06e27a0a128bc6df0de04db71f7e29efad3bece78eb937a8ecae2eb440ede58190810", 0xa5}], 0x4, &(0x7f0000000480)=[{0x78, 0x88, 0x0, "dd484a7507bdea0d5964cd42bf048b4b3862ccaceaa0ab7ca03359599c99b959b790c1a3d83d2cb27984b2024797e169b824092ab0f2105ac4f751e3073f32668fd38bcd7815753845ffeffba487b8ae95aef6e9525b03663e15f83af4e1fbed18137591"}, {0xd8, 0x107, 0x9, "ed1ee77f3c0a00bcc99899129b4e2fd5168071f108468804dde1cfbba794f4bf83758759855bd7c20da5bf2f99767a94abe073989901a010f8988fbd1f12834d1e0b3e2c52d8fc1fe7c7a5772be5b7574f6d90700ea891036a732ddf815c62edce04ca782093b36e505bb26daf215abf32cdb5945277c586e1c17681cf73974fd6a97d4f4094e5f60eb6933a983034563368aa9a64247b0599c5e845614f79848ddd0573654347ecaf2cd1ed00ac017b1915c9b84295d2cdadadfe11922b7840ecc39a87dd"}], 0x150}}, {{&(0x7f0000000600)=@nl=@kern={0x10, 0x0, 0x0, 0x40000000}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000680)="5bceda3f246cefe30be6c306751ea2ec6be2e19be367ba7dc3d5265c9e1834f2115d19c6286c5b8cc029747f821550f7f3f333b33ed8a628c13868b8a4c070d4bfde8a245661b0b4a3811e72082087149db5d9c08345428d100b7c2557b6b9c9b18e88086c78254c3f8a027d1bdfa80eb707212e58621dbd151dd83c82e9be8005e78596614ccebe6ca727ce5b8a92158c318302348edfd7e6f0bd1d33a902336c4b29bc2f755aaba68f97f43bbc02b83678bc4501a9bcb64e51d25542363302ffe8d07789af282d99cacdd1943fc84ed0e61e86bb8570cc9368b5df", 0xdc}, {&(0x7f0000000100)="0a99f3face5c778a51", 0x9}], 0x2, &(0x7f0000000780)=[{0x18, 0x107, 0x80, "ed0323"}, {0x68, 0x1, 0x4, "aa807c42c96f8cfb80e46b47245aae6fffe4446357c922827f34b557e958ce7414e19017e56129636d55dd090366d4e9fcbf1a8211183c6e0788b5960cf06b8b20ac743baf4f852a28f8c8083a1666bb75abf5"}, {0x108, 0x109, 0x38, "7d878c000620ad0f644e78a777db6370de646238c4f65f17ccc0212c996fba396502c19f1f40026f07a6ff42f186522ae467d108f557a3710a040695770b07116fae938e85b1ddb71f8a8cf1a6017e3c1b19db40051189e69c7551d0795c55f9414b736e6356a36142712e52c1cc977177cea4c5b08428e3ac58bedf8faf8925f99eab14c417ccfdedd383b986ae3dadd33cbf0c00d243ffb2018ed6681d699f50b0205b768553f9045d35d8ed3b4c772fe7e519ad7720a2f5a61b4990c32af47457444693dcdc560088f39af89fd508fa4601e23d19617a3f2d259773dcd01482e70e5146fb510400088f65327be50d21257731d5ea53b7"}, {0x80, 0x104, 0x8000, "fbda445427f2f9c9c467b99076415db25da538e20176ac926ea048bffd9f8dd7b7470caf0fc0b355dfd7486061273b2957c4017244c6848a6647e803df87e9f07bfe772b86a8bae056fb51499f80ba0fb3dc689681d01815fa1379a3895ba4ddbd21f031f5537d73ffd2be73b75669"}, {0x78, 0x10d, 0xba7, "30e375cc940b0fbbf8398942e1c33d68fddf8f6932f8c1cf30591fac76b623975879cc57013c8e45b8e9794a1c6ac725559f01f2b1b9bc86fb0446064f77eb75a4c9b2b3ea41b6e8f1c58d39cf4c499bc007bff925c1c5e561997bed6955165f5a58257966"}, {0x1010, 0x118, 0x10000, "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"}, {0x108, 0xff, 0x2, "b14636a4650cfbf4560bdae7adbe7d6368ff5ec9e0407cd38dd7aa15aa97406dc67b50daeced84f87ac92a7151b2aebea1b1a3a3d91715d8e721ae726848b94c3079804a0105723b7ca8227426d3e310dfe7b382803b8715930048fdfa7b9ff91c7b66a4e8a5798fd4aed4acd2ffc6ca29325c168f20130d04b001a5dadf729f961e770e152c42839407d7e4ba2ed4f0a645cf18f9cb54c8b339b6fcf25f975fa1300d212fb319bcb36daea34a7ffb6509fb9b2e04ddf054601ee79060571accc6d599016b1f00966af7e5bf52cb7d6e550d72eac8b885c0d6cafeb3559987dcdcbac956193f54c1f6be620bc54c48ffcf3f50"}, {0x50, 0x10e, 0x8, "ad4a4951ffcf4e258e9ccea96a0dfa8421856a121f95cc8c0967b4bec601dbe4b86b4cc22d174ec0f1923858795835009dfa6bfd4149ff9056a9"}, {0x50, 0x19c, 0x4, "11e2d99ae013973887e9239f6414ceeb558beac70a0b7ce573791b6e5cedc0447447e6bc6a9c74d280133ae3f2395f11150b55b78c57766a88907ad528d8"}], 0x1438}}], 0x2, 0x48010) lsetxattr$trusted_overlay_origin(&(0x7f0000001d40)='./file0\x00', &(0x7f0000001d80), &(0x7f0000001dc0), 0x2, 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x2000400, 0x0) 12:22:30 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) [ 79.695095][ T3736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 79.705152][ T3736] Call Trace: [ 79.708434][ T3736] [ 79.711385][ T3736] dump_stack_lvl+0xd6/0x122 [ 79.716061][ T3736] dump_stack+0x11/0x1b [ 79.720287][ T3736] should_fail+0x23c/0x250 [ 79.724711][ T3736] ? getname_flags+0x84/0x3f0 [ 79.729519][ T3736] __should_failslab+0x81/0x90 [ 79.733997][ T3739] FAULT_INJECTION: forcing a failure. [ 79.733997][ T3739] name failslab, interval 1, probability 0, space 0, times 0 [ 79.734313][ T3736] should_failslab+0x5/0x20 [ 79.751543][ T3736] kmem_cache_alloc+0x4f/0x320 [ 79.756345][ T3736] getname_flags+0x84/0x3f0 [ 79.760922][ T3736] __x64_sys_mkdir+0x31/0x50 [ 79.765499][ T3736] do_syscall_64+0x44/0xd0 [ 79.769936][ T3736] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 79.775819][ T3736] RIP: 0033:0x7f9e4a6e60f7 [ 79.780218][ T3736] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 79.799808][ T3736] RSP: 002b:00007f9e4985cf88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 79.808317][ T3736] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9e4a6e60f7 [ 79.816309][ T3736] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000000 [ 79.824402][ T3736] RBP: 00007f9e4985d020 R08: 0000000000000000 R09: 000000000001c4a6 [ 79.832618][ T3736] R10: 00000000200000c0 R11: 0000000000000246 R12: 00000000200000c0 [ 79.840576][ T3736] R13: 0000000020000000 R14: 00007f9e4985cfe0 R15: 000000002001b240 [ 79.848535][ T3736] 12:22:30 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 2) 12:22:30 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:30 executing program 4: sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000001d00)={&(0x7f0000001c40)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001cc0)={&(0x7f0000001c80)={0x2c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x42044) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000001bc0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3c6834a50ac4f9d00c46fafa67", 0xd}, {&(0x7f0000000200)="d56e8a905d387a074fc0bfe30af5ec9c68b9e323d7f1c5dbd65e6f22fd568804b09dfdc4f58a41d73f0c744da87cb8771d4161a7784148ea3bf64c7e329fad362be9a5741051e4f44d35d01523ac2e72f41dda272570e3d4d44f9a504f907e3012303e791c6db359e8923733c74f6c5a00fb6d7be8f2fd735749ae251feb631e54a66c0ee1d369c2adb4dcf370ef9445fb64a42c05372b15cb7e12d03c11eae5b4e34f25e4b9050891f06ebcdddec7de556cd6177d222219acce4e4911248a52815c1402bc7e3be5356116fcefca31a1961cf9d2e4f241c4939cdfbe", 0xdc}, {&(0x7f0000000300)="7e7fdfc926e20d0181705ed11fa4530a41d04cbb4101de89e7de00aeab5bcffbf216b635f9bcfcd3b121cbb4921762b904530d0f15efa4088b8f276da374ad3a63c76ad03f1900885aea5e8748206ffb05da203dad8a1b46be53642ea258aae7a1f60ae84b60f4ea0be80cd7baf0b2fe1c43e8b73cbd3daf2f3bc07dc2c1f9463c062f8311a0633f99ca", 0x8a}, {&(0x7f00000003c0)="641363d793899557c10dc57d8d1b1c70657061faa959438850aed7a501b0a276d23bc61fa013f38cfddb6d72c3de9cd74615646780b09c9cc2eb5b4adc29451a61438669c327f38ae435d48ddb5085ce9ee42b566a8137f5c9321fe2379238630a711b683c8321960a6b32cd806f7ddf6f847cbbee8769192f9da2310e898220e3d0e06e27a0a128bc6df0de04db71f7e29efad3bece78eb937a8ecae2eb440ede58190810", 0xa5}], 0x4, &(0x7f0000000480)=[{0x78, 0x88, 0x0, "dd484a7507bdea0d5964cd42bf048b4b3862ccaceaa0ab7ca03359599c99b959b790c1a3d83d2cb27984b2024797e169b824092ab0f2105ac4f751e3073f32668fd38bcd7815753845ffeffba487b8ae95aef6e9525b03663e15f83af4e1fbed18137591"}, {0xd8, 0x107, 0x9, "ed1ee77f3c0a00bcc99899129b4e2fd5168071f108468804dde1cfbba794f4bf83758759855bd7c20da5bf2f99767a94abe073989901a010f8988fbd1f12834d1e0b3e2c52d8fc1fe7c7a5772be5b7574f6d90700ea891036a732ddf815c62edce04ca782093b36e505bb26daf215abf32cdb5945277c586e1c17681cf73974fd6a97d4f4094e5f60eb6933a983034563368aa9a64247b0599c5e845614f79848ddd0573654347ecaf2cd1ed00ac017b1915c9b84295d2cdadadfe11922b7840ecc39a87dd"}], 0x150}}, {{&(0x7f0000000600)=@nl=@kern={0x10, 0x0, 0x0, 0x40000000}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000680)="5bceda3f246cefe30be6c306751ea2ec6be2e19be367ba7dc3d5265c9e1834f2115d19c6286c5b8cc029747f821550f7f3f333b33ed8a628c13868b8a4c070d4bfde8a245661b0b4a3811e72082087149db5d9c08345428d100b7c2557b6b9c9b18e88086c78254c3f8a027d1bdfa80eb707212e58621dbd151dd83c82e9be8005e78596614ccebe6ca727ce5b8a92158c318302348edfd7e6f0bd1d33a902336c4b29bc2f755aaba68f97f43bbc02b83678bc4501a9bcb64e51d25542363302ffe8d07789af282d99cacdd1943fc84ed0e61e86bb8570cc9368b5df", 0xdc}, {&(0x7f0000000100)="0a99f3face5c778a51", 0x9}], 0x2, &(0x7f0000000780)=[{0x18, 0x107, 0x80, "ed0323"}, {0x68, 0x1, 0x4, "aa807c42c96f8cfb80e46b47245aae6fffe4446357c922827f34b557e958ce7414e19017e56129636d55dd090366d4e9fcbf1a8211183c6e0788b5960cf06b8b20ac743baf4f852a28f8c8083a1666bb75abf5"}, {0x108, 0x109, 0x38, "7d878c000620ad0f644e78a777db6370de646238c4f65f17ccc0212c996fba396502c19f1f40026f07a6ff42f186522ae467d108f557a3710a040695770b07116fae938e85b1ddb71f8a8cf1a6017e3c1b19db40051189e69c7551d0795c55f9414b736e6356a36142712e52c1cc977177cea4c5b08428e3ac58bedf8faf8925f99eab14c417ccfdedd383b986ae3dadd33cbf0c00d243ffb2018ed6681d699f50b0205b768553f9045d35d8ed3b4c772fe7e519ad7720a2f5a61b4990c32af47457444693dcdc560088f39af89fd508fa4601e23d19617a3f2d259773dcd01482e70e5146fb510400088f65327be50d21257731d5ea53b7"}, {0x80, 0x104, 0x8000, "fbda445427f2f9c9c467b99076415db25da538e20176ac926ea048bffd9f8dd7b7470caf0fc0b355dfd7486061273b2957c4017244c6848a6647e803df87e9f07bfe772b86a8bae056fb51499f80ba0fb3dc689681d01815fa1379a3895ba4ddbd21f031f5537d73ffd2be73b75669"}, {0x78, 0x10d, 0xba7, "30e375cc940b0fbbf8398942e1c33d68fddf8f6932f8c1cf30591fac76b623975879cc57013c8e45b8e9794a1c6ac725559f01f2b1b9bc86fb0446064f77eb75a4c9b2b3ea41b6e8f1c58d39cf4c499bc007bff925c1c5e561997bed6955165f5a58257966"}, {0x1010, 0x118, 0x10000, "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"}, {0x108, 0xff, 0x2, "b14636a4650cfbf4560bdae7adbe7d6368ff5ec9e0407cd38dd7aa15aa97406dc67b50daeced84f87ac92a7151b2aebea1b1a3a3d91715d8e721ae726848b94c3079804a0105723b7ca8227426d3e310dfe7b382803b8715930048fdfa7b9ff91c7b66a4e8a5798fd4aed4acd2ffc6ca29325c168f20130d04b001a5dadf729f961e770e152c42839407d7e4ba2ed4f0a645cf18f9cb54c8b339b6fcf25f975fa1300d212fb319bcb36daea34a7ffb6509fb9b2e04ddf054601ee79060571accc6d599016b1f00966af7e5bf52cb7d6e550d72eac8b885c0d6cafeb3559987dcdcbac956193f54c1f6be620bc54c48ffcf3f50"}, {0x50, 0x10e, 0x8, "ad4a4951ffcf4e258e9ccea96a0dfa8421856a121f95cc8c0967b4bec601dbe4b86b4cc22d174ec0f1923858795835009dfa6bfd4149ff9056a9"}, {0x50, 0x19c, 0x4, "11e2d99ae013973887e9239f6414ceeb558beac70a0b7ce573791b6e5cedc0447447e6bc6a9c74d280133ae3f2395f11150b55b78c57766a88907ad528d8"}], 0x1438}}], 0x2, 0x48010) lsetxattr$trusted_overlay_origin(&(0x7f0000001d40)='./file0\x00', &(0x7f0000001d80), &(0x7f0000001dc0), 0x2, 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x2000400, 0x0) sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000001d00)={&(0x7f0000001c40)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001cc0)={&(0x7f0000001c80)={0x2c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x42044) (async) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) sendmmsg(0xffffffffffffffff, &(0x7f0000001bc0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3c6834a50ac4f9d00c46fafa67", 0xd}, {&(0x7f0000000200)="d56e8a905d387a074fc0bfe30af5ec9c68b9e323d7f1c5dbd65e6f22fd568804b09dfdc4f58a41d73f0c744da87cb8771d4161a7784148ea3bf64c7e329fad362be9a5741051e4f44d35d01523ac2e72f41dda272570e3d4d44f9a504f907e3012303e791c6db359e8923733c74f6c5a00fb6d7be8f2fd735749ae251feb631e54a66c0ee1d369c2adb4dcf370ef9445fb64a42c05372b15cb7e12d03c11eae5b4e34f25e4b9050891f06ebcdddec7de556cd6177d222219acce4e4911248a52815c1402bc7e3be5356116fcefca31a1961cf9d2e4f241c4939cdfbe", 0xdc}, {&(0x7f0000000300)="7e7fdfc926e20d0181705ed11fa4530a41d04cbb4101de89e7de00aeab5bcffbf216b635f9bcfcd3b121cbb4921762b904530d0f15efa4088b8f276da374ad3a63c76ad03f1900885aea5e8748206ffb05da203dad8a1b46be53642ea258aae7a1f60ae84b60f4ea0be80cd7baf0b2fe1c43e8b73cbd3daf2f3bc07dc2c1f9463c062f8311a0633f99ca", 0x8a}, {&(0x7f00000003c0)="641363d793899557c10dc57d8d1b1c70657061faa959438850aed7a501b0a276d23bc61fa013f38cfddb6d72c3de9cd74615646780b09c9cc2eb5b4adc29451a61438669c327f38ae435d48ddb5085ce9ee42b566a8137f5c9321fe2379238630a711b683c8321960a6b32cd806f7ddf6f847cbbee8769192f9da2310e898220e3d0e06e27a0a128bc6df0de04db71f7e29efad3bece78eb937a8ecae2eb440ede58190810", 0xa5}], 0x4, &(0x7f0000000480)=[{0x78, 0x88, 0x0, "dd484a7507bdea0d5964cd42bf048b4b3862ccaceaa0ab7ca03359599c99b959b790c1a3d83d2cb27984b2024797e169b824092ab0f2105ac4f751e3073f32668fd38bcd7815753845ffeffba487b8ae95aef6e9525b03663e15f83af4e1fbed18137591"}, {0xd8, 0x107, 0x9, "ed1ee77f3c0a00bcc99899129b4e2fd5168071f108468804dde1cfbba794f4bf83758759855bd7c20da5bf2f99767a94abe073989901a010f8988fbd1f12834d1e0b3e2c52d8fc1fe7c7a5772be5b7574f6d90700ea891036a732ddf815c62edce04ca782093b36e505bb26daf215abf32cdb5945277c586e1c17681cf73974fd6a97d4f4094e5f60eb6933a983034563368aa9a64247b0599c5e845614f79848ddd0573654347ecaf2cd1ed00ac017b1915c9b84295d2cdadadfe11922b7840ecc39a87dd"}], 0x150}}, {{&(0x7f0000000600)=@nl=@kern={0x10, 0x0, 0x0, 0x40000000}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000680)="5bceda3f246cefe30be6c306751ea2ec6be2e19be367ba7dc3d5265c9e1834f2115d19c6286c5b8cc029747f821550f7f3f333b33ed8a628c13868b8a4c070d4bfde8a245661b0b4a3811e72082087149db5d9c08345428d100b7c2557b6b9c9b18e88086c78254c3f8a027d1bdfa80eb707212e58621dbd151dd83c82e9be8005e78596614ccebe6ca727ce5b8a92158c318302348edfd7e6f0bd1d33a902336c4b29bc2f755aaba68f97f43bbc02b83678bc4501a9bcb64e51d25542363302ffe8d07789af282d99cacdd1943fc84ed0e61e86bb8570cc9368b5df", 0xdc}, {&(0x7f0000000100)="0a99f3face5c778a51", 0x9}], 0x2, &(0x7f0000000780)=[{0x18, 0x107, 0x80, "ed0323"}, {0x68, 0x1, 0x4, "aa807c42c96f8cfb80e46b47245aae6fffe4446357c922827f34b557e958ce7414e19017e56129636d55dd090366d4e9fcbf1a8211183c6e0788b5960cf06b8b20ac743baf4f852a28f8c8083a1666bb75abf5"}, {0x108, 0x109, 0x38, "7d878c000620ad0f644e78a777db6370de646238c4f65f17ccc0212c996fba396502c19f1f40026f07a6ff42f186522ae467d108f557a3710a040695770b07116fae938e85b1ddb71f8a8cf1a6017e3c1b19db40051189e69c7551d0795c55f9414b736e6356a36142712e52c1cc977177cea4c5b08428e3ac58bedf8faf8925f99eab14c417ccfdedd383b986ae3dadd33cbf0c00d243ffb2018ed6681d699f50b0205b768553f9045d35d8ed3b4c772fe7e519ad7720a2f5a61b4990c32af47457444693dcdc560088f39af89fd508fa4601e23d19617a3f2d259773dcd01482e70e5146fb510400088f65327be50d21257731d5ea53b7"}, {0x80, 0x104, 0x8000, "fbda445427f2f9c9c467b99076415db25da538e20176ac926ea048bffd9f8dd7b7470caf0fc0b355dfd7486061273b2957c4017244c6848a6647e803df87e9f07bfe772b86a8bae056fb51499f80ba0fb3dc689681d01815fa1379a3895ba4ddbd21f031f5537d73ffd2be73b75669"}, {0x78, 0x10d, 0xba7, "30e375cc940b0fbbf8398942e1c33d68fddf8f6932f8c1cf30591fac76b623975879cc57013c8e45b8e9794a1c6ac725559f01f2b1b9bc86fb0446064f77eb75a4c9b2b3ea41b6e8f1c58d39cf4c499bc007bff925c1c5e561997bed6955165f5a58257966"}, {0x1010, 0x118, 0x10000, "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"}, {0x108, 0xff, 0x2, "b14636a4650cfbf4560bdae7adbe7d6368ff5ec9e0407cd38dd7aa15aa97406dc67b50daeced84f87ac92a7151b2aebea1b1a3a3d91715d8e721ae726848b94c3079804a0105723b7ca8227426d3e310dfe7b382803b8715930048fdfa7b9ff91c7b66a4e8a5798fd4aed4acd2ffc6ca29325c168f20130d04b001a5dadf729f961e770e152c42839407d7e4ba2ed4f0a645cf18f9cb54c8b339b6fcf25f975fa1300d212fb319bcb36daea34a7ffb6509fb9b2e04ddf054601ee79060571accc6d599016b1f00966af7e5bf52cb7d6e550d72eac8b885c0d6cafeb3559987dcdcbac956193f54c1f6be620bc54c48ffcf3f50"}, {0x50, 0x10e, 0x8, "ad4a4951ffcf4e258e9ccea96a0dfa8421856a121f95cc8c0967b4bec601dbe4b86b4cc22d174ec0f1923858795835009dfa6bfd4149ff9056a9"}, {0x50, 0x19c, 0x4, "11e2d99ae013973887e9239f6414ceeb558beac70a0b7ce573791b6e5cedc0447447e6bc6a9c74d280133ae3f2395f11150b55b78c57766a88907ad528d8"}], 0x1438}}], 0x2, 0x48010) (async) lsetxattr$trusted_overlay_origin(&(0x7f0000001d40)='./file0\x00', &(0x7f0000001d80), &(0x7f0000001dc0), 0x2, 0x0) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x2000400, 0x0) (async) [ 79.851552][ T3739] CPU: 0 PID: 3739 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 79.859884][ T3739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 79.869944][ T3739] Call Trace: [ 79.873218][ T3739] [ 79.876150][ T3739] dump_stack_lvl+0xd6/0x122 [ 79.880802][ T3739] dump_stack+0x11/0x1b [ 79.884968][ T3739] should_fail+0x23c/0x250 [ 79.889393][ T3739] ? getname_flags+0x84/0x3f0 [ 79.894142][ T3739] __should_failslab+0x81/0x90 [ 79.898980][ T3739] should_failslab+0x5/0x20 [ 79.903560][ T3739] kmem_cache_alloc+0x4f/0x320 [ 79.908304][ T3739] getname_flags+0x84/0x3f0 [ 79.912839][ T3739] __x64_sys_mkdir+0x31/0x50 [ 79.917410][ T3739] do_syscall_64+0x44/0xd0 [ 79.921856][ T3739] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 79.927774][ T3739] RIP: 0033:0x7fa003fe50f7 [ 79.932222][ T3739] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 12:22:30 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 2) 12:22:30 executing program 4: sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000001d00)={&(0x7f0000001c40)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001cc0)={&(0x7f0000001c80)={0x2c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x42044) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) sendmmsg(0xffffffffffffffff, &(0x7f0000001bc0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3c6834a50ac4f9d00c46fafa67", 0xd}, {&(0x7f0000000200)="d56e8a905d387a074fc0bfe30af5ec9c68b9e323d7f1c5dbd65e6f22fd568804b09dfdc4f58a41d73f0c744da87cb8771d4161a7784148ea3bf64c7e329fad362be9a5741051e4f44d35d01523ac2e72f41dda272570e3d4d44f9a504f907e3012303e791c6db359e8923733c74f6c5a00fb6d7be8f2fd735749ae251feb631e54a66c0ee1d369c2adb4dcf370ef9445fb64a42c05372b15cb7e12d03c11eae5b4e34f25e4b9050891f06ebcdddec7de556cd6177d222219acce4e4911248a52815c1402bc7e3be5356116fcefca31a1961cf9d2e4f241c4939cdfbe", 0xdc}, {&(0x7f0000000300)="7e7fdfc926e20d0181705ed11fa4530a41d04cbb4101de89e7de00aeab5bcffbf216b635f9bcfcd3b121cbb4921762b904530d0f15efa4088b8f276da374ad3a63c76ad03f1900885aea5e8748206ffb05da203dad8a1b46be53642ea258aae7a1f60ae84b60f4ea0be80cd7baf0b2fe1c43e8b73cbd3daf2f3bc07dc2c1f9463c062f8311a0633f99ca", 0x8a}, {&(0x7f00000003c0)="641363d793899557c10dc57d8d1b1c70657061faa959438850aed7a501b0a276d23bc61fa013f38cfddb6d72c3de9cd74615646780b09c9cc2eb5b4adc29451a61438669c327f38ae435d48ddb5085ce9ee42b566a8137f5c9321fe2379238630a711b683c8321960a6b32cd806f7ddf6f847cbbee8769192f9da2310e898220e3d0e06e27a0a128bc6df0de04db71f7e29efad3bece78eb937a8ecae2eb440ede58190810", 0xa5}], 0x4, &(0x7f0000000480)=[{0x78, 0x88, 0x0, "dd484a7507bdea0d5964cd42bf048b4b3862ccaceaa0ab7ca03359599c99b959b790c1a3d83d2cb27984b2024797e169b824092ab0f2105ac4f751e3073f32668fd38bcd7815753845ffeffba487b8ae95aef6e9525b03663e15f83af4e1fbed18137591"}, {0xd8, 0x107, 0x9, "ed1ee77f3c0a00bcc99899129b4e2fd5168071f108468804dde1cfbba794f4bf83758759855bd7c20da5bf2f99767a94abe073989901a010f8988fbd1f12834d1e0b3e2c52d8fc1fe7c7a5772be5b7574f6d90700ea891036a732ddf815c62edce04ca782093b36e505bb26daf215abf32cdb5945277c586e1c17681cf73974fd6a97d4f4094e5f60eb6933a983034563368aa9a64247b0599c5e845614f79848ddd0573654347ecaf2cd1ed00ac017b1915c9b84295d2cdadadfe11922b7840ecc39a87dd"}], 0x150}}, {{&(0x7f0000000600)=@nl=@kern={0x10, 0x0, 0x0, 0x40000000}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000680)="5bceda3f246cefe30be6c306751ea2ec6be2e19be367ba7dc3d5265c9e1834f2115d19c6286c5b8cc029747f821550f7f3f333b33ed8a628c13868b8a4c070d4bfde8a245661b0b4a3811e72082087149db5d9c08345428d100b7c2557b6b9c9b18e88086c78254c3f8a027d1bdfa80eb707212e58621dbd151dd83c82e9be8005e78596614ccebe6ca727ce5b8a92158c318302348edfd7e6f0bd1d33a902336c4b29bc2f755aaba68f97f43bbc02b83678bc4501a9bcb64e51d25542363302ffe8d07789af282d99cacdd1943fc84ed0e61e86bb8570cc9368b5df", 0xdc}, {&(0x7f0000000100)="0a99f3face5c778a51", 0x9}], 0x2, &(0x7f0000000780)=[{0x18, 0x107, 0x80, "ed0323"}, {0x68, 0x1, 0x4, "aa807c42c96f8cfb80e46b47245aae6fffe4446357c922827f34b557e958ce7414e19017e56129636d55dd090366d4e9fcbf1a8211183c6e0788b5960cf06b8b20ac743baf4f852a28f8c8083a1666bb75abf5"}, {0x108, 0x109, 0x38, "7d878c000620ad0f644e78a777db6370de646238c4f65f17ccc0212c996fba396502c19f1f40026f07a6ff42f186522ae467d108f557a3710a040695770b07116fae938e85b1ddb71f8a8cf1a6017e3c1b19db40051189e69c7551d0795c55f9414b736e6356a36142712e52c1cc977177cea4c5b08428e3ac58bedf8faf8925f99eab14c417ccfdedd383b986ae3dadd33cbf0c00d243ffb2018ed6681d699f50b0205b768553f9045d35d8ed3b4c772fe7e519ad7720a2f5a61b4990c32af47457444693dcdc560088f39af89fd508fa4601e23d19617a3f2d259773dcd01482e70e5146fb510400088f65327be50d21257731d5ea53b7"}, {0x80, 0x104, 0x8000, "fbda445427f2f9c9c467b99076415db25da538e20176ac926ea048bffd9f8dd7b7470caf0fc0b355dfd7486061273b2957c4017244c6848a6647e803df87e9f07bfe772b86a8bae056fb51499f80ba0fb3dc689681d01815fa1379a3895ba4ddbd21f031f5537d73ffd2be73b75669"}, {0x78, 0x10d, 0xba7, "30e375cc940b0fbbf8398942e1c33d68fddf8f6932f8c1cf30591fac76b623975879cc57013c8e45b8e9794a1c6ac725559f01f2b1b9bc86fb0446064f77eb75a4c9b2b3ea41b6e8f1c58d39cf4c499bc007bff925c1c5e561997bed6955165f5a58257966"}, {0x1010, 0x118, 0x10000, "0eeafb55695631ea9761e5bc9bf439b8a1a1bafb44774e3746f23ff762db16042e0abfc6c4fcc7d45ca751b21d362ea458d17598becf9c4f5754b695d57431bcbcba10e8d0837ab797754a61d043d3810e9b77d9a74a2c9b3c8f8dc47dada3788b7d4d162d39fe426dd13d322df4ced12b80c12f60ebcce5fa7890f15e845807ec9369d41d39bdf1178016e3b90c247678f6888dac554707e18a4a3b3b4dfecd02ec6a24377d1ac0ffcf004de9d5ad17906d141b0fb0e059bd4bc5aef4f33fb134b9d2688a232abb0ab9f3a672640970c90d6448541afef82a5607d3e6e86243498f623712256340afa41ce9587142396b1c8411f1bfb3b8e453029ca602ea9c1a64264ba90ab0ae029b879be4d0bbbad26a6181a8625b8f206f4f20081224219eba4f321be76cf4538f83022156506d49749e9ca21bfc4fc7f7a0f088253074a63b0e8ef9390fca75efc79266e9f618ca0e000c3ad4838346fda8c647dd64f8f84070612d5eacb2920f97b96b83f86ad4fa78285b8261f03c3795a4ecbe6a0f2edddd676842ed43918ce730391d81f795c34bb0e0cc487da56c5fee2b1a6e4bb2a24d4d8e1f990e8b6bf091233e2c86b6f267699b6303c27ae026fc9f33742dd29f20f083a532b171d345d827987c9b551177f359bc187e387db9c665e61b60da15b74a87b6fc4651df3f2aec4c1946b815236e47ce1e9dcaf186e027c16f21c8d54e7dd2c0f00dd791c9b9c03e5b6368716663daefc299284cb7f16309265abcc51b1a3d2f5e5fd527bfc60b7eb7eed351a591e904d832828d5ecf4bbc16582d439a6062887c96cbb560f507e880899a1fa1198ca6add3e9f36af8fd709c0502c66369636cbf1be52bb944bb8195069ab33bb5d97b96f2a5d207f9958187277594c13d252256be988de9b2da1a63c2e1a4769c37059145974822bca56ada3db1a5ac1b345b83e0f3efce3032fe9b7ce7297cf597bbbad69d192f6d3fc7b7b803040994a29aa67193b71353f06d04a0ad94ce81db4f8b2c2902c4a35c7f9f692fbee5942d16ae2ffe4f6072d2895c945663a2649fcfbeddd09b1a7b77ea1a1b32233a5aeb618e1d6dcb3f70b6d4d8ff8fdcf05e2db31aad589d3fbdacfff08f1c3adaf18604aacc531cf32a556c7af067200d70353b2788b6ddfaa6af6dc1017d3588b8b64c4488d79e76b7418df58274b1548b1f154060e9cd5107f8f1849aedc06b4b233d55b06e708f4ec9b82b6f6f63470ccbbefbe08b344bc257dfa233c1e9e5569c4570ea8228d4284fe6eed19c1331645821711db5397e72d80b8e09fdef326fd646cf07345eda88a69c82a54cb2b1e6f0b8dec9dd9cb6160d96f694bc578ba953446e4de535d29bf038318bb27b2c6516038be2a9295cff115a7d337e8bfb37c3c9921db91132fdc1de77342c7a6fc6617694539c5e3d8b8d40d40f36a3b0318338dd4a49c02d3db9a471d00e998cd5beef2308fe93c7dea32a02ab9fafcd730460648c819e766755289b45a1932e33ad9e83e34a0de2581070cc54061f6a952731817868f607e7f3c8b37a17a0a3d086d4ea0e7a5d7e9d79b0afbe57c22f274c0f2318f1b38611465454ed0c5323453ae6d67dfd2662f258ef13e8348b7e853b291ed0074bfb57400fcd7585667ace5a7577f277e1f720e5663e1c14367393ecd4b83dd2152e855a599428299f09bf16841ab8fb9f57d8f943a1856baf1b1552b0d3c4f597e07197a39d9147f80d6425e937131fed2e681c785fa72073b851876cc1236f92dc3719741d5ed7f427323c550e2a65dbced8689b1b29dad996a321e45687436a8f6f8a28bdbb38b39848ed3d0e7b63792e6d04715c74d4182d2f706461b7c011e7b74ca7cbb03f6d30a9c38f8c8e8e4541d3e6f592ca0487285c495bcd8232ab7fb4e16c0522b7a9840964e50f511382717fd10de4e69d51fb8f3114f257dabace347251af3e9b47205dda66bd7bb63171331136e37128e644aa4ae5b32a99f050b85fd2e07a0842fbb4c062b2d4ae01f1abc502104bab0e1e311b9ffd4e91ee9938aedbe8b2ce69c293a92d34a20a241d2777dff382e995eb2cfc6b3488298aee209124b310e9b3bce7d34e905ff84059375139d75f7b2d4eaaaa96d4b93bf4157e4e0b4afbbb51d71073f98a775dee05b543a77e1b4e0a64fd790b5c43883f637474eb4067db8cbf865bffae3423fa809d0681bc7a13c45dec8c5b8bf4b036141fa536fc0ef0017d4433fb460ae01d10f812c9db493b3aa4f47255ac469fc14302b15e2abf45734d89d2deaf6ae170360df4b67b3cc668da0742412f581241c02b2342ddf27f2a27b97f551df1eaa199715f74fc4eee68ba24bd3ef33e192c98c65cac7c84055719f248cec8fd377c4960282b27e69a73d723e642da1acab5e8e474787c27eb4fdea50605ae78ac108b12e85d994075fd900fa2cc4526559135637bcccc00d60dda2512d3e931ae8c7d4610a40ce79b6839f711f11e98aaf49899461faf5cc6f6fba91f22894b9b3314fbe58c275e322ee4c3e52b365d8d8c735f0ed8d0a8ba57c97a8293c457e2e0185cb81570ac17f7a112362fc3a3cb046b1741a4120472212983d6c46faae1df9e319705dd1c82a95204b1f51fb69dbc542a6d2f28b23e636de149818011216d99ab9ecd870598db176e6d2865f3d470e0c135b272b4ef5fb0c84551bd92d141afc49c80b7b20aad59971ee00cdd03d159e5192b243cbc1f117db44acd81835bff7fbcee77800c2db3634e1650faa8b7302bcd2e4edf8f1e7d3c08f593ee9d3c34baf1585e1978e7de0fb9f95d88327a44fe64989c3487955a6a765f48fc58c6c547995f3ef5e61bb7240bc6fd8321ff44dc19f01e1529971cf95ac4c6cc9a9ca05d9b566a5b6ae42717491d711a39346cc2d6ce3ff6c7f4c28df01ace4181aab3eb3e025aba3da584c5e6b61ceee2d000a9816b265a60d4de7560c78ebce4243bbc5118038e31c1cbd319aa7daa9ff75eed3de101986e5abac6fe3b6c7ca4a27198d2ec4b76bca260e6eca6c4085185e20d96de3563915762726e1c5c89ee550ee742f22c86794d4c3d23d0466dc9e66054fb998fa7b487f18c9364eaecfa13ca6baff4746076611384d360906c42c75eb1dde6adbcf459b68541fe80326adfc425e1496a15476a26bf7e384ea6305d6758fdcf4bde449fa15d64d6ea472acbeca47261e78a9d42ba18a9699d6228f08d21f316e4434c000dfff2d3c335ff6b5f6d0841d7b98801ba023b35de9182828114d6187e56aa498a2e1df8951e2ac5475420700eb4f35803645a364024d3b70e2fb80b0231c717cb9798cfe7cb7a5f17114d8e53c2c299cbf0677f5f39b17cbe82db0175c9842d6bebf6a3f619deb3f2437a644033c7521e9ff23598f90818027f70a29505ce851ce27ab1fea6e869e29a23078a4c5b336a99a232c0278e596d4f8b54f69ea8a2d02201927b284d6817f85ad8b61150078ca281b21b87a94f3e389bd8a6b3c3e4425d055371b1dadb73fc7e65ec45980cc724aea7f255a34ba0fad754fd5975f8326b113bca20e7df2103d8b582558b9d37bf3d71b4ed1983b105cf979da3a9afc06e6276ea21bd286f490f6b96f070ff635c1643cd6ced30962c9b572066d8063dc3f8cf237ccdb73d726d3532f73d895843277a80c8996fc3abedbca4964a4ec279c3a23298ea98fea88ef600e94c7e3cd65d965309cabf3c31026ca47d59de9325b42e4cf9d651d95ad9465de0aeac45b40967bd304d4a75c911b95b082889e00eb9c0771aa4bc044181cb5dd2ab524b039996a0e077e91263054961eb2139a9ca6131eea44cca16be688fe2285f7476eacd7f3d1a1fab5554d95c71246b0acd8bdeed2fbf2a1ae71025e64f635524cb2f03ca5cc336bde80adab3c97e9dfb7f35400b31e0aab132e2ec04db76a7c135563c57a8940647341d9d675c36dd7d29ca24285dae01e4ee60f944f71405bd3394cff2e32ce91cda4d30bc288b492785a55a9775384cb2557776056d67d1fec6bbfb467554d935103b42b8137696dfe6bd1a12c2ab938514360cd54642d804666ce261055b8978b9f2be72394de95a7e2faa21cc53742a2c4572d9252d7e14e0ce5a93bfce7c5766b072579c072938da62ac9f85e8f5949f9539206d4e602cee3b45fae44ad1b2ebbc4d84fc24ea77eae3d281611b408efb60f2580b2384ec291149c16ba0210a4cf2c0dd586755cb5f6c8ec3991bce12eed0b91a8f39768aa9bfc077e738d82c9a57b3baec1de9720745e00170452c18570b11650024b1079521680033bf391700bd37e2a2831978e437e9b87ff5fc1e3f8ef55379ad3d6a20ab7c3fb007fe3f1d8a39a0f7baf8471a39e841a4be085c1858b31d01c097114c334c4cec1984edad2dcc735fe25f036ad7f6c6665d33fb39e9f0c40e9f13cd9e242fcf00dc2e458ae4cda979f0f19973c8e3cd83c384f9c2c85d5562aa4d4db69572778dba830a56c89c9240fe33bcd7d99e7e0f8c86bacad3e5a44eda90827c02dc2d671e58b9408c52deb6b89c23a6b2de7892cfe3cf5a79b24d6d49a3274e477a268b2bda7dbffdcc96d565021712de3f95bb41f1fb6426381dbe07139a7f69d44bf3e66643db00891422b8c35799638038918bf4dc6d1c23108c98703475a0db80e2e82f3f7c5d557351215e5bd1f65256a57f8a50d6694c1a0a02f78f63b1b726d29fa1517219eb6777e5b70af6fe98acffda21e550427188044cdec3761e034404db7bf166f30b7c9b9ebc16478d3e7e2d97cab6d09931a7ea07a4955aa62f9f5a6da46818d6514dfaec1c3d97c34d8d7e01c01da68328c4be7eae252d42bbc6f96cdf5e46f38585e1acd1d2f2112ce8b0da6cd982cccd0afa11fcf977d31f14d2e8c296f60c8bf81ae5b9773f97149ed8fba36cf04c6299208fbc038f8913e3d41c479dc119eceb9b56a32256f8684679005506c232d7f2c3547ae3e66d71fe64379857abd77ed525e73feefc2c095a34e97b05d91420f76383e4b192de5d6483623de098baa01f35770f5a1848213d9b23762a9f6fb66096d50e886c1bb8bdf7c68ad7429746a58160cd57fcf1745042a0b190222b347aa1ee6f61cab7757fe4d707bc3d04fd5da6edbfe5095720748a31f3d3fc78590ca14da55138af8e713e66aecb74087cd42a047f88cd435fae95568be4f60e29cafa38563ce81402fd947c41dea7df23207eb6c6c85f15845f8502c8f7b7fa10874678bd1e053f5e190134c819064f402dec5a1567d06e99867106e3fb7fe6d09a972eb3589c6f66147b07402e50bdf6db89122830cb735696a6591509661e6e4f95e8a45ab8c970f601fc0baccf5fc417f0f61052bc84eb808beaf2622b907bcdafb669bcf1d95a71788ca3bb922cf3d7afffa68a637057f033663198594a080e69d99e5ea2936ead6976a036286b058cc699ed2066abb173ffe8c1effd7ab505ad95fb4dc0d03d6737a8e48c90ab405633644608c44aef060ad9b475d860148af617223486e5d8035cb971703052ebaa2dffa877488b0633f1c8b78534c12287d72293e239846a314e36a8fdfee275a1b0b2434c3a81c002d8b66192211967286d5d7a3ce76259883a00f32eebc376ab25028f04ab44bd8bb0cceb98b338f62b3490ef6f0e000ef3f4166efbd1d033cb86b36b4b1be9fce4163c24e7b17982b459383755738639500285b75bfdeba44ffb67ba966ce4b120d16ed58d799c69bf29edf08825db99be684d80e86eb68996b3692ea9530578336c1cf89308f4c513666c"}, {0x108, 0xff, 0x2, "b14636a4650cfbf4560bdae7adbe7d6368ff5ec9e0407cd38dd7aa15aa97406dc67b50daeced84f87ac92a7151b2aebea1b1a3a3d91715d8e721ae726848b94c3079804a0105723b7ca8227426d3e310dfe7b382803b8715930048fdfa7b9ff91c7b66a4e8a5798fd4aed4acd2ffc6ca29325c168f20130d04b001a5dadf729f961e770e152c42839407d7e4ba2ed4f0a645cf18f9cb54c8b339b6fcf25f975fa1300d212fb319bcb36daea34a7ffb6509fb9b2e04ddf054601ee79060571accc6d599016b1f00966af7e5bf52cb7d6e550d72eac8b885c0d6cafeb3559987dcdcbac956193f54c1f6be620bc54c48ffcf3f50"}, {0x50, 0x10e, 0x8, "ad4a4951ffcf4e258e9ccea96a0dfa8421856a121f95cc8c0967b4bec601dbe4b86b4cc22d174ec0f1923858795835009dfa6bfd4149ff9056a9"}, {0x50, 0x19c, 0x4, "11e2d99ae013973887e9239f6414ceeb558beac70a0b7ce573791b6e5cedc0447447e6bc6a9c74d280133ae3f2395f11150b55b78c57766a88907ad528d8"}], 0x1438}}], 0x2, 0x48010) (async) lsetxattr$trusted_overlay_origin(&(0x7f0000001d40)='./file0\x00', &(0x7f0000001d80), &(0x7f0000001dc0), 0x2, 0x0) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x2000400, 0x0) [ 79.951948][ T3739] RSP: 002b:00007fa00315bf88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 79.960551][ T3739] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa003fe50f7 [ 79.968578][ T3739] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000000 [ 79.976605][ T3739] RBP: 00007fa00315c020 R08: 0000000000000000 R09: 000000000001c4a6 [ 79.984569][ T3739] R10: 00000000200000c0 R11: 0000000000000246 R12: 00000000200000c0 [ 79.992521][ T3739] R13: 0000000020000000 R14: 00007fa00315bfe0 R15: 000000002001b240 [ 80.000475][ T3739] [ 80.027693][ T3752] FAULT_INJECTION: forcing a failure. [ 80.027693][ T3752] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 80.034548][ T3762] FAULT_INJECTION: forcing a failure. [ 80.034548][ T3762] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 80.040800][ T3752] CPU: 1 PID: 3752 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller #0 [ 80.062239][ T3752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.072542][ T3752] Call Trace: [ 80.075819][ T3752] [ 80.078733][ T3752] dump_stack_lvl+0xd6/0x122 [ 80.083317][ T3752] dump_stack+0x11/0x1b [ 80.087463][ T3752] should_fail+0x23c/0x250 [ 80.091867][ T3752] should_fail_usercopy+0x16/0x20 [ 80.096945][ T3752] strncpy_from_user+0x21/0x250 [ 80.101782][ T3752] getname_flags+0xb8/0x3f0 [ 80.106274][ T3752] __x64_sys_mkdir+0x31/0x50 [ 80.110890][ T3752] do_syscall_64+0x44/0xd0 [ 80.115388][ T3752] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 80.121369][ T3752] RIP: 0033:0x7f70509450f7 [ 80.125963][ T3752] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 80.145646][ T3752] RSP: 002b:00007f704fabbf88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 80.154053][ T3752] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f70509450f7 [ 80.162025][ T3752] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000000 [ 80.169985][ T3752] RBP: 00007f704fabc020 R08: 0000000000000000 R09: 000000000001c4a6 12:22:31 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) [ 80.177948][ T3752] R10: 00000000200000c0 R11: 0000000000000246 R12: 00000000200000c0 [ 80.185913][ T3752] R13: 0000000020000000 R14: 00007f704fabbfe0 R15: 000000002001b240 [ 80.193876][ T3752] [ 80.196884][ T3762] CPU: 0 PID: 3762 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 80.205275][ T3762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.213353][ T3758] EXT4-fs: 107 callbacks suppressed [ 80.213373][ T3758] EXT4-fs (sda1): re-mounted. Quota mode: none. 12:22:31 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r9, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r2, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:31 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 3) [ 80.215327][ T3762] Call Trace: [ 80.215381][ T3762] [ 80.215387][ T3762] dump_stack_lvl+0xd6/0x122 [ 80.215412][ T3762] dump_stack+0x11/0x1b [ 80.215432][ T3762] should_fail+0x23c/0x250 [ 80.241790][ T3752] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 80.242387][ T3762] should_fail_usercopy+0x16/0x20 [ 80.258024][ T3762] strncpy_from_user+0x21/0x250 [ 80.259756][ T3763] FAULT_INJECTION: forcing a failure. [ 80.259756][ T3763] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 80.262895][ T3762] getname_flags+0xb8/0x3f0 [ 80.262920][ T3762] __x64_sys_mkdir+0x31/0x50 [ 80.284977][ T3762] do_syscall_64+0x44/0xd0 [ 80.289390][ T3762] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 80.295319][ T3762] RIP: 0033:0x7fa003fe50f7 [ 80.299735][ T3762] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 80.319373][ T3762] RSP: 002b:00007fa00315bf88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 80.327790][ T3762] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa003fe50f7 [ 80.335748][ T3762] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000000 [ 80.343704][ T3762] RBP: 00007fa00315c020 R08: 0000000000000000 R09: 000000000001c4a6 [ 80.351741][ T3762] R10: 00000000200000c0 R11: 0000000000000246 R12: 00000000200000c0 [ 80.359710][ T3762] R13: 0000000020000000 R14: 00007fa00315bfe0 R15: 000000002001b240 [ 80.367674][ T3762] [ 80.370680][ T3763] CPU: 1 PID: 3763 Comm: syz-executor.5 Not tainted 5.16.0-syzkaller #0 [ 80.378410][ T3762] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 80.379123][ T3763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.395384][ T3763] Call Trace: [ 80.398659][ T3763] [ 80.401586][ T3763] dump_stack_lvl+0xd6/0x122 [ 80.406177][ T3763] dump_stack+0x11/0x1b [ 80.410337][ T3763] should_fail+0x23c/0x250 [ 80.415104][ T3763] should_fail_usercopy+0x16/0x20 [ 80.420140][ T3763] strncpy_from_user+0x21/0x250 12:22:31 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount$cgroup(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x1000, &(0x7f0000000200)={[{@release_agent={'release_agent', 0x3d, './file0'}}, {@release_agent={'release_agent', 0x3d, './file0'}}, {@cpuset_v2_mode}, {@release_agent={'release_agent', 0x3d, './file0'}}, {@none}, {@cpuset_v2_mode}, {@xattr}], [{@dont_hash}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) 12:22:31 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 3) 12:22:31 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount$cgroup(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x1000, &(0x7f0000000200)={[{@release_agent={'release_agent', 0x3d, './file0'}}, {@release_agent={'release_agent', 0x3d, './file0'}}, {@cpuset_v2_mode}, {@release_agent={'release_agent', 0x3d, './file0'}}, {@none}, {@cpuset_v2_mode}, {@xattr}], [{@dont_hash}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) 12:22:31 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) [ 80.424994][ T3763] getname_flags+0xb8/0x3f0 [ 80.430863][ T3763] __x64_sys_mkdir+0x31/0x50 [ 80.435460][ T3763] do_syscall_64+0x44/0xd0 [ 80.439963][ T3763] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 80.445866][ T3763] RIP: 0033:0x7f9e4a6e60f7 [ 80.450275][ T3763] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 80.469914][ T3763] RSP: 002b:00007f9e4985cf88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 80.478311][ T3763] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9e4a6e60f7 [ 80.486265][ T3763] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000000 [ 80.494218][ T3763] RBP: 00007f9e4985d020 R08: 0000000000000000 R09: 000000000001c4a6 [ 80.502168][ T3763] R10: 00000000200000c0 R11: 0000000000000246 R12: 00000000200000c0 [ 80.510195][ T3763] R13: 0000000020000000 R14: 00007f9e4985cfe0 R15: 000000002001b240 [ 80.518196][ T3763] [ 80.522390][ T3763] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 80.547452][ T3776] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 80.551051][ T3780] FAULT_INJECTION: forcing a failure. [ 80.551051][ T3780] name failslab, interval 1, probability 0, space 0, times 0 [ 80.557310][ T3781] FAULT_INJECTION: forcing a failure. [ 80.557310][ T3781] name failslab, interval 1, probability 0, space 0, times 0 [ 80.566370][ T3780] CPU: 0 PID: 3780 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 80.587237][ T3780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.597281][ T3780] Call Trace: [ 80.600556][ T3780] [ 80.603472][ T3780] dump_stack_lvl+0xd6/0x122 [ 80.608061][ T3780] dump_stack+0x11/0x1b [ 80.612205][ T3780] should_fail+0x23c/0x250 [ 80.616613][ T3780] ? strndup_user+0x64/0xa0 [ 80.621110][ T3780] __should_failslab+0x81/0x90 [ 80.625872][ T3780] should_failslab+0x5/0x20 [ 80.630401][ T3780] __kmalloc_track_caller+0x6d/0x370 [ 80.635692][ T3780] memdup_user+0x22/0xb0 [ 80.639936][ T3780] strndup_user+0x64/0xa0 [ 80.644264][ T3780] __se_sys_mount+0x4e/0x2f0 [ 80.648930][ T3780] ? do_user_addr_fault+0x7d4/0xb90 [ 80.654121][ T3780] __x64_sys_mount+0x63/0x70 [ 80.658704][ T3780] do_syscall_64+0x44/0xd0 [ 80.663120][ T3780] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 80.669012][ T3780] RIP: 0033:0x7fa003fe751a [ 80.673415][ T3780] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 80.693005][ T3780] RSP: 002b:00007fa00315bf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 80.701407][ T3780] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa003fe751a [ 80.709363][ T3780] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 80.717336][ T3780] RBP: 00007fa00315c020 R08: 00007fa00315c020 R09: 00000000200000c0 [ 80.725292][ T3780] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 80.733248][ T3780] R13: 0000000020000000 R14: 00007fa00315bfe0 R15: 000000002001b240 [ 80.741208][ T3780] 12:22:31 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 3) 12:22:31 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount$cgroup(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x1000, &(0x7f0000000200)={[{@release_agent={'release_agent', 0x3d, './file0'}}, {@release_agent={'release_agent', 0x3d, './file0'}}, {@cpuset_v2_mode}, {@release_agent={'release_agent', 0x3d, './file0'}}, {@none}, {@cpuset_v2_mode}, {@xattr}], [{@dont_hash}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) 12:22:31 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:31 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r9, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r2, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:31 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 4) 12:22:31 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) mknod(&(0x7f0000000040)='./file1\x00', 0x40, 0x4) [ 80.744225][ T3781] CPU: 1 PID: 3781 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller #0 [ 80.752561][ T3781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.762615][ T3781] Call Trace: [ 80.765922][ T3781] [ 80.768853][ T3781] dump_stack_lvl+0xd6/0x122 [ 80.773458][ T3781] dump_stack+0x11/0x1b [ 80.777621][ T3781] should_fail+0x23c/0x250 [ 80.782068][ T3781] ? strndup_user+0x64/0xa0 [ 80.786578][ T3781] __should_failslab+0x81/0x90 [ 80.791355][ T3781] should_failslab+0x5/0x20 12:22:31 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async) mknod(&(0x7f0000000040)='./file1\x00', 0x40, 0x4) [ 80.795867][ T3781] __kmalloc_track_caller+0x6d/0x370 [ 80.801159][ T3781] memdup_user+0x22/0xb0 [ 80.805415][ T3781] strndup_user+0x64/0xa0 [ 80.809759][ T3781] __se_sys_mount+0x4e/0x2f0 [ 80.814352][ T3781] ? do_user_addr_fault+0x7d4/0xb90 [ 80.819551][ T3781] __x64_sys_mount+0x63/0x70 [ 80.824146][ T3781] do_syscall_64+0x44/0xd0 [ 80.828565][ T3781] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 80.834472][ T3781] RIP: 0033:0x7f705094751a [ 80.838933][ T3781] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 80.859587][ T3781] RSP: 002b:00007f704fabbf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 80.867978][ T3781] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f705094751a [ 80.875930][ T3781] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 80.883886][ T3781] RBP: 00007f704fabc020 R08: 00007f704fabc020 R09: 00000000200000c0 [ 80.891848][ T3781] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 80.899800][ T3781] R13: 0000000020000000 R14: 00007f704fabbfe0 R15: 000000002001b240 [ 80.907758][ T3781] [ 80.930792][ T3794] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 80.934248][ T3798] FAULT_INJECTION: forcing a failure. [ 80.934248][ T3798] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 80.938666][ T3799] FAULT_INJECTION: forcing a failure. [ 80.938666][ T3799] name failslab, interval 1, probability 0, space 0, times 0 [ 80.950245][ T3798] CPU: 0 PID: 3798 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 80.971118][ T3798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.981172][ T3798] Call Trace: [ 80.984440][ T3798] [ 80.987361][ T3798] dump_stack_lvl+0xd6/0x122 [ 80.991949][ T3798] dump_stack+0x11/0x1b [ 80.996100][ T3798] should_fail+0x23c/0x250 [ 81.000511][ T3798] should_fail_usercopy+0x16/0x20 [ 81.005537][ T3798] _copy_from_user+0x1c/0xd0 [ 81.010128][ T3798] memdup_user+0x5b/0xb0 [ 81.014364][ T3798] strndup_user+0x64/0xa0 [ 81.018684][ T3798] __se_sys_mount+0x4e/0x2f0 [ 81.023261][ T3798] ? do_user_addr_fault+0x7d4/0xb90 [ 81.028450][ T3798] __x64_sys_mount+0x63/0x70 [ 81.033048][ T3798] do_syscall_64+0x44/0xd0 [ 81.037546][ T3798] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 81.043520][ T3798] RIP: 0033:0x7fa003fe751a [ 81.047922][ T3798] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 81.067513][ T3798] RSP: 002b:00007fa00315bf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 81.075911][ T3798] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa003fe751a [ 81.083870][ T3798] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 81.091828][ T3798] RBP: 00007fa00315c020 R08: 00007fa00315c020 R09: 00000000200000c0 12:22:31 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 4) 12:22:31 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async, rerun: 32) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async, rerun: 32) mknod(&(0x7f0000000040)='./file1\x00', 0x40, 0x4) 12:22:31 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 5) [ 81.099783][ T3798] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 81.107739][ T3798] R13: 0000000020000000 R14: 00007fa00315bfe0 R15: 000000002001b240 [ 81.115708][ T3798] [ 81.118718][ T3799] CPU: 1 PID: 3799 Comm: syz-executor.5 Not tainted 5.16.0-syzkaller #0 [ 81.127085][ T3799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 81.137137][ T3799] Call Trace: [ 81.140412][ T3799] [ 81.143339][ T3799] dump_stack_lvl+0xd6/0x122 12:22:31 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r9, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r2, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:31 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) [ 81.147933][ T3799] dump_stack+0x11/0x1b [ 81.152096][ T3799] should_fail+0x23c/0x250 [ 81.156517][ T3799] ? strndup_user+0x64/0xa0 [ 81.161074][ T3799] __should_failslab+0x81/0x90 [ 81.165849][ T3799] should_failslab+0x5/0x20 [ 81.170356][ T3799] __kmalloc_track_caller+0x6d/0x370 [ 81.175650][ T3799] memdup_user+0x22/0xb0 [ 81.179904][ T3799] strndup_user+0x64/0xa0 [ 81.184336][ T3799] __se_sys_mount+0x4e/0x2f0 [ 81.188964][ T3799] ? do_user_addr_fault+0x7d4/0xb90 [ 81.194142][ T3799] __x64_sys_mount+0x63/0x70 [ 81.198895][ T3799] do_syscall_64+0x44/0xd0 [ 81.203299][ T3799] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 81.209187][ T3799] RIP: 0033:0x7f9e4a6e851a [ 81.219666][ T3799] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 81.240305][ T3799] RSP: 002b:00007f9e4985cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 81.248706][ T3799] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9e4a6e851a [ 81.256762][ T3799] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 81.264715][ T3799] RBP: 00007f9e4985d020 R08: 00007f9e4985d020 R09: 00000000200000c0 [ 81.272689][ T3799] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 81.280662][ T3799] R13: 0000000020000000 R14: 00007f9e4985cfe0 R15: 000000002001b240 [ 81.288618][ T3799] 12:22:32 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 4) 12:22:32 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x100010, 0x0) mount(&(0x7f0000000040)=@nullb, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fusectl\x00', 0x8000, &(0x7f0000000180)='iso9660\x00') 12:22:32 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x100010, 0x0) mount(&(0x7f0000000040)=@nullb, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fusectl\x00', 0x8000, &(0x7f0000000180)='iso9660\x00') 12:22:32 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async, rerun: 32) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x100010, 0x0) (async, rerun: 32) mount(&(0x7f0000000040)=@nullb, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fusectl\x00', 0x8000, &(0x7f0000000180)='iso9660\x00') [ 81.299281][ T3805] FAULT_INJECTION: forcing a failure. [ 81.299281][ T3805] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 81.312381][ T3805] CPU: 1 PID: 3805 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller #0 [ 81.320736][ T3805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 81.330795][ T3805] Call Trace: [ 81.334075][ T3805] [ 81.337010][ T3805] dump_stack_lvl+0xd6/0x122 [ 81.341614][ T3805] dump_stack+0x11/0x1b [ 81.345872][ T3805] should_fail+0x23c/0x250 12:22:32 executing program 4: membarrier(0x8, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="3c2f6615b100c661d06fa8fcd61c9951146b310fb092f32efc9ba5ff884a2b5bd25bd54d9d87f34f073ba20ddcfeabd290c94aa03748b908779e97233c6cd19623a0b282077f9071707776fdfd0dcb8055a973a89c622b8919b7953e42550a40d87605fece7e5c745f21fe99ef3fe3479fb1ee9a69f65dd353812183d708b6b3eda022296f464dcf9a623eba344a73bd4c691849d7ab1d"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) 12:22:32 executing program 4: membarrier(0x8, 0x0) (async, rerun: 64) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async, rerun: 64) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="3c2f6615b100c661d06fa8fcd61c9951146b310fb092f32efc9ba5ff884a2b5bd25bd54d9d87f34f073ba20ddcfeabd290c94aa03748b908779e97233c6cd19623a0b282077f9071707776fdfd0dcb8055a973a89c622b8919b7953e42550a40d87605fece7e5c745f21fe99ef3fe3479fb1ee9a69f65dd353812183d708b6b3eda022296f464dcf9a623eba344a73bd4c691849d7ab1d"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) [ 81.350296][ T3805] should_fail_usercopy+0x16/0x20 [ 81.355326][ T3805] _copy_from_user+0x1c/0xd0 [ 81.359922][ T3805] memdup_user+0x5b/0xb0 [ 81.364175][ T3805] strndup_user+0x64/0xa0 [ 81.368521][ T3805] __se_sys_mount+0x4e/0x2f0 [ 81.373125][ T3805] ? do_user_addr_fault+0x7d4/0xb90 [ 81.378423][ T3805] __x64_sys_mount+0x63/0x70 [ 81.383108][ T3805] do_syscall_64+0x44/0xd0 [ 81.387534][ T3805] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 81.393440][ T3805] RIP: 0033:0x7f705094751a 12:22:32 executing program 4: membarrier(0x8, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="3c2f6615b100c661d06fa8fcd61c9951146b310fb092f32efc9ba5ff884a2b5bd25bd54d9d87f34f073ba20ddcfeabd290c94aa03748b908779e97233c6cd19623a0b282077f9071707776fdfd0dcb8055a973a89c622b8919b7953e42550a40d87605fece7e5c745f21fe99ef3fe3479fb1ee9a69f65dd353812183d708b6b3eda022296f464dcf9a623eba344a73bd4c691849d7ab1d"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) membarrier(0x8, 0x0) (async) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="3c2f6615b100c661d06fa8fcd61c9951146b310fb092f32efc9ba5ff884a2b5bd25bd54d9d87f34f073ba20ddcfeabd290c94aa03748b908779e97233c6cd19623a0b282077f9071707776fdfd0dcb8055a973a89c622b8919b7953e42550a40d87605fece7e5c745f21fe99ef3fe3479fb1ee9a69f65dd353812183d708b6b3eda022296f464dcf9a623eba344a73bd4c691849d7ab1d"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async) [ 81.397855][ T3805] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 81.417643][ T3805] RSP: 002b:00007f704fabbf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 81.426238][ T3805] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f705094751a [ 81.434207][ T3805] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 81.442162][ T3805] RBP: 00007f704fabc020 R08: 00007f704fabc020 R09: 00000000200000c0 12:22:32 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 5) 12:22:32 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KDFONTOP_SET(r0, 0x7040, 0x0) getdents64(r0, &(0x7f0000000240)=""/182, 0xb6) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYBLOB="230638d84853077f6f6c82ef5316e1d0b1b61156def059331d5aebc273861089cf623306a570ec14875b6252d667dd9f49618d8f05ea0d0bf445a37c9f0cabf686b0693766102ef333752acd1e3155e55158b44a7dcb15093d2e55c66da1ea0703ac2b2e852c626dc942dc0f192cbc669d55207fceb197316cc368f4cc72019c9c198d636520bf05e38d9ade23dc4243b5ae4b5e2efcc4a7ad", @ANYRESDEC=0x0], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x4000402, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x84) [ 81.450115][ T3805] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 81.458164][ T3805] R13: 0000000020000000 R14: 00007f704fabbfe0 R15: 000000002001b240 [ 81.466386][ T3805] [ 81.480428][ T3831] No source specified [ 81.499201][ T3829] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 81.508143][ T3837] FAULT_INJECTION: forcing a failure. [ 81.508143][ T3837] name failslab, interval 1, probability 0, space 0, times 0 [ 81.520786][ T3837] CPU: 1 PID: 3837 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller #0 [ 81.529209][ T3837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 81.539272][ T3837] Call Trace: [ 81.542443][ T3833] FAULT_INJECTION: forcing a failure. [ 81.542443][ T3833] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 81.542813][ T3837] [ 81.558832][ T3837] dump_stack_lvl+0xd6/0x122 [ 81.563428][ T3837] dump_stack+0x11/0x1b [ 81.567584][ T3837] should_fail+0x23c/0x250 [ 81.572012][ T3837] ? __se_sys_mount+0xf7/0x2f0 [ 81.576858][ T3837] __should_failslab+0x81/0x90 [ 81.581617][ T3837] should_failslab+0x5/0x20 [ 81.586115][ T3837] kmem_cache_alloc_trace+0x52/0x350 [ 81.591491][ T3837] ? memdup_user+0x96/0xb0 [ 81.595902][ T3837] __se_sys_mount+0xf7/0x2f0 [ 81.600481][ T3837] ? do_user_addr_fault+0x7d4/0xb90 [ 81.605670][ T3837] __x64_sys_mount+0x63/0x70 [ 81.610250][ T3837] do_syscall_64+0x44/0xd0 [ 81.614660][ T3837] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 81.621070][ T3837] RIP: 0033:0x7f705094751a [ 81.625472][ T3837] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 81.645238][ T3837] RSP: 002b:00007f704fabbf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 81.654589][ T3837] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f705094751a [ 81.662559][ T3837] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 81.670514][ T3837] RBP: 00007f704fabc020 R08: 00007f704fabc020 R09: 00000000200000c0 [ 81.678478][ T3837] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 81.686434][ T3837] R13: 0000000020000000 R14: 00007f704fabbfe0 R15: 000000002001b240 [ 81.694391][ T3837] [ 81.697394][ T3833] CPU: 0 PID: 3833 Comm: syz-executor.5 Not tainted 5.16.0-syzkaller #0 [ 81.703196][ T3835] FAULT_INJECTION: forcing a failure. [ 81.703196][ T3835] name failslab, interval 1, probability 0, space 0, times 0 [ 81.705722][ T3833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 81.705734][ T3833] Call Trace: [ 81.705740][ T3833] [ 81.705746][ T3833] dump_stack_lvl+0xd6/0x122 [ 81.705770][ T3833] dump_stack+0x11/0x1b [ 81.743392][ T3833] should_fail+0x23c/0x250 [ 81.747802][ T3833] should_fail_usercopy+0x16/0x20 [ 81.752820][ T3833] _copy_from_user+0x1c/0xd0 [ 81.757395][ T3833] memdup_user+0x5b/0xb0 [ 81.761630][ T3833] strndup_user+0x64/0xa0 [ 81.766039][ T3833] __se_sys_mount+0x4e/0x2f0 [ 81.770617][ T3833] ? do_user_addr_fault+0x7d4/0xb90 [ 81.775809][ T3833] __x64_sys_mount+0x63/0x70 [ 81.780392][ T3833] do_syscall_64+0x44/0xd0 [ 81.784809][ T3833] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 81.790780][ T3833] RIP: 0033:0x7f9e4a6e851a [ 81.795189][ T3833] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 81.814780][ T3833] RSP: 002b:00007f9e4985cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 81.823176][ T3833] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9e4a6e851a [ 81.831134][ T3833] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 81.839089][ T3833] RBP: 00007f9e4985d020 R08: 00007f9e4985d020 R09: 00000000200000c0 [ 81.847045][ T3833] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 81.855176][ T3833] R13: 0000000020000000 R14: 00007f9e4985cfe0 R15: 000000002001b240 [ 81.863138][ T3833] [ 81.866148][ T3835] CPU: 1 PID: 3835 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 81.874476][ T3835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 81.884542][ T3835] Call Trace: [ 81.887913][ T3835] [ 81.890863][ T3835] dump_stack_lvl+0xd6/0x122 [ 81.895437][ T3835] dump_stack+0x11/0x1b [ 81.899574][ T3835] should_fail+0x23c/0x250 [ 81.903984][ T3835] ? __se_sys_mount+0xf7/0x2f0 [ 81.908728][ T3835] __should_failslab+0x81/0x90 [ 81.913478][ T3835] should_failslab+0x5/0x20 [ 81.917972][ T3835] kmem_cache_alloc_trace+0x52/0x350 [ 81.923272][ T3835] ? memdup_user+0x96/0xb0 [ 81.927706][ T3835] __se_sys_mount+0xf7/0x2f0 [ 81.932321][ T3835] ? do_user_addr_fault+0x7d4/0xb90 [ 81.937854][ T3835] __x64_sys_mount+0x63/0x70 [ 81.942427][ T3835] do_syscall_64+0x44/0xd0 [ 81.946832][ T3835] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 81.952715][ T3835] RIP: 0033:0x7fa003fe751a [ 81.957114][ T3835] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 81.976707][ T3835] RSP: 002b:00007fa00315bf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 81.985626][ T3835] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa003fe751a [ 81.993587][ T3835] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 12:22:32 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 6) 12:22:32 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:32 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KDFONTOP_SET(r0, 0x7040, 0x0) (async) getdents64(r0, &(0x7f0000000240)=""/182, 0xb6) (async) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async, rerun: 64) mount(&(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYBLOB="230638d84853077f6f6c82ef5316e1d0b1b61156def059331d5aebc273861089cf623306a570ec14875b6252d667dd9f49618d8f05ea0d0bf445a37c9f0cabf686b0693766102ef333752acd1e3155e55158b44a7dcb15093d2e55c66da1ea0703ac2b2e852c626dc942dc0f192cbc669d55207fceb197316cc368f4cc72019c9c198d636520bf05e38d9ade23dc4243b5ae4b5e2efcc4a7ad", @ANYRESDEC=0x0], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x4000402, 0x0) (async, rerun: 64) creat(&(0x7f0000000040)='./file0\x00', 0x84) 12:22:32 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:32 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 6) 12:22:32 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 5) [ 82.001625][ T3835] RBP: 00007fa00315c020 R08: 00007fa00315c020 R09: 00000000200000c0 [ 82.009588][ T3835] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 82.017608][ T3835] R13: 0000000020000000 R14: 00007fa00315bfe0 R15: 000000002001b240 [ 82.025566][ T3835] 12:22:32 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) [ 82.044619][ T3840] No source specified [ 82.047440][ T3844] FAULT_INJECTION: forcing a failure. [ 82.047440][ T3844] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 82.061676][ T3844] CPU: 1 PID: 3844 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 82.070009][ T3844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 82.080066][ T3844] Call Trace: [ 82.083346][ T3844] [ 82.086276][ T3844] dump_stack_lvl+0xd6/0x122 [ 82.087608][ T3846] FAULT_INJECTION: forcing a failure. [ 82.087608][ T3846] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 82.090882][ T3844] dump_stack+0x11/0x1b [ 82.108036][ T3844] should_fail+0x23c/0x250 [ 82.112448][ T3844] should_fail_usercopy+0x16/0x20 [ 82.117463][ T3844] _copy_from_user+0x1c/0xd0 [ 82.122051][ T3844] __se_sys_mount+0x119/0x2f0 [ 82.126739][ T3844] ? do_user_addr_fault+0x7d4/0xb90 [ 82.131941][ T3844] __x64_sys_mount+0x63/0x70 [ 82.136527][ T3844] do_syscall_64+0x44/0xd0 [ 82.140938][ T3844] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 82.146836][ T3844] RIP: 0033:0x7fa003fe751a [ 82.151244][ T3844] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 82.170844][ T3844] RSP: 002b:00007fa00315bf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 82.179335][ T3844] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa003fe751a [ 82.187291][ T3844] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 82.195245][ T3844] RBP: 00007fa00315c020 R08: 00007fa00315c020 R09: 00000000200000c0 [ 82.203203][ T3844] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 82.211161][ T3844] R13: 0000000020000000 R14: 00007fa00315bfe0 R15: 000000002001b240 [ 82.219214][ T3844] [ 82.222222][ T3846] CPU: 0 PID: 3846 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller #0 [ 82.226927][ T3844] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 82.230557][ T3846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 82.230569][ T3846] Call Trace: [ 82.230575][ T3846] [ 82.230582][ T3846] dump_stack_lvl+0xd6/0x122 [ 82.238126][ T3850] FAULT_INJECTION: forcing a failure. [ 82.238126][ T3850] name failslab, interval 1, probability 0, space 0, times 0 [ 82.246856][ T3846] dump_stack+0x11/0x1b [ 82.246883][ T3846] should_fail+0x23c/0x250 [ 82.246899][ T3846] should_fail_usercopy+0x16/0x20 [ 82.246916][ T3846] _copy_from_user+0x1c/0xd0 [ 82.288342][ T3846] __se_sys_mount+0x119/0x2f0 [ 82.293016][ T3846] ? do_user_addr_fault+0x7d4/0xb90 [ 82.298204][ T3846] __x64_sys_mount+0x63/0x70 [ 82.302786][ T3846] do_syscall_64+0x44/0xd0 [ 82.307199][ T3846] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 82.313083][ T3846] RIP: 0033:0x7f705094751a [ 82.317484][ T3846] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 82.337076][ T3846] RSP: 002b:00007f704fabbf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 82.345482][ T3846] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f705094751a [ 82.353439][ T3846] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 82.361479][ T3846] RBP: 00007f704fabc020 R08: 00007f704fabc020 R09: 00000000200000c0 [ 82.369435][ T3846] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 82.377390][ T3846] R13: 0000000020000000 R14: 00007f704fabbfe0 R15: 000000002001b240 [ 82.385355][ T3846] 12:22:33 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KDFONTOP_SET(r0, 0x7040, 0x0) getdents64(r0, &(0x7f0000000240)=""/182, 0xb6) (async) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYBLOB="230638d84853077f6f6c82ef5316e1d0b1b61156def059331d5aebc273861089cf623306a570ec14875b6252d667dd9f49618d8f05ea0d0bf445a37c9f0cabf686b0693766102ef333752acd1e3155e55158b44a7dcb15093d2e55c66da1ea0703ac2b2e852c626dc942dc0f192cbc669d55207fceb197316cc368f4cc72019c9c198d636520bf05e38d9ade23dc4243b5ae4b5e2efcc4a7ad", @ANYRESDEC=0x0], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x4000402, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x84) 12:22:33 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) open$dir(&(0x7f0000000040)='./file0/file0\x00', 0x800, 0x188) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@mcast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @dev}}, 0x0, @in6=@private1}}, &(0x7f0000000180)=0xe8) mount$cgroup(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000300)={[{@noprefix}, {@subsystem='cpuacct'}, {@release_agent={'release_agent', 0x3d, './file0'}}], [{@subj_type={'subj_type', 0x3d, 'iso9660\x00'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, 'iso9660\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&&{\''}}, {@euid_lt}, {@measure}, {@euid_gt={'euid>', r0}}]}) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='.f\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) [ 82.388363][ T3850] CPU: 1 PID: 3850 Comm: syz-executor.5 Not tainted 5.16.0-syzkaller #0 [ 82.396694][ T3850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 82.404656][ T3846] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 82.406748][ T3850] Call Trace: [ 82.406756][ T3850] [ 82.406762][ T3850] dump_stack_lvl+0xd6/0x122 [ 82.406786][ T3850] dump_stack+0x11/0x1b [ 82.427911][ T3850] should_fail+0x23c/0x250 [ 82.432333][ T3850] ? __se_sys_mount+0xf7/0x2f0 [ 82.437112][ T3850] __should_failslab+0x81/0x90 [ 82.441890][ T3850] should_failslab+0x5/0x20 12:22:33 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 7) 12:22:33 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 7) 12:22:33 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) open$dir(&(0x7f0000000040)='./file0/file0\x00', 0x800, 0x188) (async) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@mcast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @dev}}, 0x0, @in6=@private1}}, &(0x7f0000000180)=0xe8) mount$cgroup(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000300)={[{@noprefix}, {@subsystem='cpuacct'}, {@release_agent={'release_agent', 0x3d, './file0'}}], [{@subj_type={'subj_type', 0x3d, 'iso9660\x00'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, 'iso9660\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&&{\''}}, {@euid_lt}, {@measure}, {@euid_gt={'euid>', r0}}]}) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='.f\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) [ 82.446396][ T3850] kmem_cache_alloc_trace+0x52/0x350 [ 82.451691][ T3850] ? memdup_user+0x96/0xb0 [ 82.456117][ T3850] __se_sys_mount+0xf7/0x2f0 [ 82.460710][ T3850] ? do_user_addr_fault+0x7d4/0xb90 [ 82.465951][ T3850] __x64_sys_mount+0x63/0x70 [ 82.470546][ T3850] do_syscall_64+0x44/0xd0 [ 82.474974][ T3850] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 82.480882][ T3850] RIP: 0033:0x7f9e4a6e851a [ 82.485297][ T3850] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 82.488630][ T3848] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 82.504901][ T3850] RSP: 002b:00007f9e4985cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 82.504923][ T3850] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9e4a6e851a [ 82.504935][ T3850] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 82.504945][ T3850] RBP: 00007f9e4985d020 R08: 00007f9e4985d020 R09: 00000000200000c0 12:22:33 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:33 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 6) 12:22:33 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) open$dir(&(0x7f0000000040)='./file0/file0\x00', 0x800, 0x188) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@mcast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @dev}}, 0x0, @in6=@private1}}, &(0x7f0000000180)=0xe8) mount$cgroup(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000300)={[{@noprefix}, {@subsystem='cpuacct'}, {@release_agent={'release_agent', 0x3d, './file0'}}], [{@subj_type={'subj_type', 0x3d, 'iso9660\x00'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, 'iso9660\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&&{\''}}, {@euid_lt}, {@measure}, {@euid_gt={'euid>', r0}}]}) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='.f\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) open$dir(&(0x7f0000000040)='./file0/file0\x00', 0x800, 0x188) (async) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@mcast1, @in=@initdev}}, {{@in6=@ipv4={""/10, ""/2, @dev}}, 0x0, @in6=@private1}}, &(0x7f0000000180)=0xe8) (async) mount$cgroup(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000300)={[{@noprefix}, {@subsystem='cpuacct'}, {@release_agent={'release_agent', 0x3d, './file0'}}], [{@subj_type={'subj_type', 0x3d, 'iso9660\x00'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, 'iso9660\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&&{\''}}, {@euid_lt}, {@measure}, {@euid_gt={'euid>', r0}}]}) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='.f\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async) 12:22:33 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, 0x0) 12:22:33 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) [ 82.504956][ T3850] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 82.504967][ T3850] R13: 0000000020000000 R14: 00007f9e4985cfe0 R15: 000000002001b240 [ 82.504982][ T3850] [ 82.513379][ T3857] No source specified [ 82.552889][ T3868] FAULT_INJECTION: forcing a failure. [ 82.552889][ T3868] name failslab, interval 1, probability 0, space 0, times 0 [ 82.579676][ T3868] CPU: 0 PID: 3868 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller #0 12:22:33 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) (async) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) 12:22:33 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='iso9660\x00', 0x0, 0x0) (async) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) 12:22:33 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./n'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) [ 82.588005][ T3868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 82.598064][ T3868] Call Trace: [ 82.601347][ T3868] [ 82.604276][ T3868] dump_stack_lvl+0xd6/0x122 [ 82.608961][ T3868] dump_stack+0x11/0x1b [ 82.613127][ T3868] should_fail+0x23c/0x250 [ 82.617550][ T3868] ? getname_flags+0x84/0x3f0 [ 82.622236][ T3868] __should_failslab+0x81/0x90 [ 82.627099][ T3868] should_failslab+0x5/0x20 [ 82.631607][ T3868] kmem_cache_alloc+0x4f/0x320 [ 82.636381][ T3868] getname_flags+0x84/0x3f0 [ 82.640910][ T3868] ? should_fail+0xd6/0x250 12:22:33 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./n'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./n'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async) [ 82.645423][ T3868] user_path_at_empty+0x28/0x110 [ 82.650369][ T3868] __se_sys_mount+0x217/0x2f0 [ 82.655054][ T3868] ? do_user_addr_fault+0x7d4/0xb90 [ 82.660435][ T3868] __x64_sys_mount+0x63/0x70 [ 82.665024][ T3868] do_syscall_64+0x44/0xd0 [ 82.669453][ T3868] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 82.675359][ T3868] RIP: 0033:0x7f705094751a [ 82.679777][ T3868] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 82.699465][ T3868] RSP: 002b:00007f704fabbf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 82.707861][ T3868] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f705094751a [ 82.716073][ T3868] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 82.724022][ T3868] RBP: 00007f704fabc020 R08: 00007f704fabc020 R09: 00000000200000c0 [ 82.732407][ T3868] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 82.740419][ T3868] R13: 0000000020000000 R14: 00007f704fabbfe0 R15: 000000002001b240 [ 82.748371][ T3868] 12:22:33 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 8) [ 82.771386][ T3895] FAULT_INJECTION: forcing a failure. [ 82.771386][ T3895] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 82.784501][ T3895] CPU: 0 PID: 3895 Comm: syz-executor.5 Not tainted 5.16.0-syzkaller #0 [ 82.792831][ T3895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 82.802894][ T3895] Call Trace: [ 82.806173][ T3895] [ 82.809104][ T3895] dump_stack_lvl+0xd6/0x122 [ 82.809774][ T3892] FAULT_INJECTION: forcing a failure. [ 82.809774][ T3892] name failslab, interval 1, probability 0, space 0, times 0 [ 82.813707][ T3895] dump_stack+0x11/0x1b [ 82.830777][ T3895] should_fail+0x23c/0x250 [ 82.835200][ T3895] should_fail_usercopy+0x16/0x20 [ 82.840210][ T3895] _copy_from_user+0x1c/0xd0 [ 82.844787][ T3895] __se_sys_mount+0x119/0x2f0 [ 82.849454][ T3895] ? do_user_addr_fault+0x7d4/0xb90 [ 82.854644][ T3895] __x64_sys_mount+0x63/0x70 [ 82.859223][ T3895] do_syscall_64+0x44/0xd0 [ 82.863629][ T3895] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 82.869514][ T3895] RIP: 0033:0x7f9e4a6e851a [ 82.873916][ T3895] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 82.893511][ T3895] RSP: 002b:00007f9e4985cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 82.901913][ T3895] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9e4a6e851a [ 82.909870][ T3895] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 82.917826][ T3895] RBP: 00007f9e4985d020 R08: 00007f9e4985d020 R09: 00000000200000c0 [ 82.925780][ T3895] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 82.933735][ T3895] R13: 0000000020000000 R14: 00007f9e4985cfe0 R15: 000000002001b240 [ 82.941693][ T3895] [ 82.944695][ T3892] CPU: 1 PID: 3892 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 82.953019][ T3892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 82.963058][ T3892] Call Trace: [ 82.966320][ T3892] [ 82.969234][ T3892] dump_stack_lvl+0xd6/0x122 [ 82.973813][ T3892] dump_stack+0x11/0x1b [ 82.977953][ T3892] should_fail+0x23c/0x250 [ 82.982354][ T3892] ? getname_flags+0x84/0x3f0 [ 82.987023][ T3892] __should_failslab+0x81/0x90 [ 82.991789][ T3892] should_failslab+0x5/0x20 [ 82.996295][ T3892] kmem_cache_alloc+0x4f/0x320 [ 83.001055][ T3892] getname_flags+0x84/0x3f0 [ 83.005552][ T3892] ? should_fail+0xd6/0x250 [ 83.010047][ T3892] user_path_at_empty+0x28/0x110 [ 83.014973][ T3892] __se_sys_mount+0x217/0x2f0 [ 83.019643][ T3892] ? do_user_addr_fault+0x7d4/0xb90 [ 83.024829][ T3892] __x64_sys_mount+0x63/0x70 [ 83.029406][ T3892] do_syscall_64+0x44/0xd0 [ 83.033814][ T3892] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 83.039722][ T3892] RIP: 0033:0x7fa003fe751a [ 83.044127][ T3892] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 83.063721][ T3892] RSP: 002b:00007fa00315bf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 12:22:33 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 8) 12:22:33 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./n'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) 12:22:33 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, 0x0) [ 83.072118][ T3892] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa003fe751a [ 83.080072][ T3892] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 83.088028][ T3892] RBP: 00007fa00315c020 R08: 00007fa00315c020 R09: 00000000200000c0 [ 83.095987][ T3892] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 83.103947][ T3892] R13: 0000000020000000 R14: 00007fa00315bfe0 R15: 000000002001b240 [ 83.111943][ T3892] 12:22:33 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 7) 12:22:33 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:33 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2e2f66f89161f1e51ab61cecbb007284b8175413ae61c7869398bdb2c172e5eed2c3c5b9f270e4240bb2dd3403d3bf0e73a8eda6d93b8a930f3a75b3c4d11acefefb089d5faed7f526df8a1cd4cb81fd034256ce2f4a69e6ba5efb9e034119b012ab8739571ebfa792b6158c74f24dd0f9626edbac48e4bcd1ee813a92e5d21e2b4ccd0b7558b5469d3df1e06aa57f8d720b773d566e59253c4d83a35f2501a5680eae998ea87f48e4df45e1f84948891b14a74a0c02ac1e32347721c2ee152cce97"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)=[&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='\x00', &(0x7f0000000280)='iso9660\x00', &(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='iso9660\x00', &(0x7f0000000340)='!@.,-^\x00', &(0x7f0000000380)='iso9660\x00'], &(0x7f0000000580)=[&(0x7f0000000400)='iso9660\x00', &(0x7f0000000440)='iso9660\x00', &(0x7f0000000480)='iso9660\x00', &(0x7f00000004c0)='$\x00', &(0x7f0000000500)='iso9660\x00', &(0x7f0000000540)='{-!#-([\x00']) 12:22:33 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2e2f66f89161f1e51ab61cecbb007284b8175413ae61c7869398bdb2c172e5eed2c3c5b9f270e4240bb2dd3403d3bf0e73a8eda6d93b8a930f3a75b3c4d11acefefb089d5faed7f526df8a1cd4cb81fd034256ce2f4a69e6ba5efb9e034119b012ab8739571ebfa792b6158c74f24dd0f9626edbac48e4bcd1ee813a92e5d21e2b4ccd0b7558b5469d3df1e06aa57f8d720b773d566e59253c4d83a35f2501a5680eae998ea87f48e4df45e1f84948891b14a74a0c02ac1e32347721c2ee152cce97"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)=[&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='\x00', &(0x7f0000000280)='iso9660\x00', &(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='iso9660\x00', &(0x7f0000000340)='!@.,-^\x00', &(0x7f0000000380)='iso9660\x00'], &(0x7f0000000580)=[&(0x7f0000000400)='iso9660\x00', &(0x7f0000000440)='iso9660\x00', &(0x7f0000000480)='iso9660\x00', &(0x7f00000004c0)='$\x00', &(0x7f0000000500)='iso9660\x00', &(0x7f0000000540)='{-!#-([\x00']) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2e2f66f89161f1e51ab61cecbb007284b8175413ae61c7869398bdb2c172e5eed2c3c5b9f270e4240bb2dd3403d3bf0e73a8eda6d93b8a930f3a75b3c4d11acefefb089d5faed7f526df8a1cd4cb81fd034256ce2f4a69e6ba5efb9e034119b012ab8739571ebfa792b6158c74f24dd0f9626edbac48e4bcd1ee813a92e5d21e2b4ccd0b7558b5469d3df1e06aa57f8d720b773d566e59253c4d83a35f2501a5680eae998ea87f48e4df45e1f84948891b14a74a0c02ac1e32347721c2ee152cce97"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)=[&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='\x00', &(0x7f0000000280)='iso9660\x00', &(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='iso9660\x00', &(0x7f0000000340)='!@.,-^\x00', &(0x7f0000000380)='iso9660\x00'], &(0x7f0000000580)=[&(0x7f0000000400)='iso9660\x00', &(0x7f0000000440)='iso9660\x00', &(0x7f0000000480)='iso9660\x00', &(0x7f00000004c0)='$\x00', &(0x7f0000000500)='iso9660\x00', &(0x7f0000000540)='{-!#-([\x00']) (async) 12:22:33 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, 0x0) 12:22:34 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2e2f66f89161f1e51ab61cecbb007284b8175413ae61c7869398bdb2c172e5eed2c3c5b9f270e4240bb2dd3403d3bf0e73a8eda6d93b8a930f3a75b3c4d11acefefb089d5faed7f526df8a1cd4cb81fd034256ce2f4a69e6ba5efb9e034119b012ab8739571ebfa792b6158c74f24dd0f9626edbac48e4bcd1ee813a92e5d21e2b4ccd0b7558b5469d3df1e06aa57f8d720b773d566e59253c4d83a35f2501a5680eae998ea87f48e4df45e1f84948891b14a74a0c02ac1e32347721c2ee152cce97"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000003c0)=[&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='\x00', &(0x7f0000000280)='iso9660\x00', &(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='iso9660\x00', &(0x7f0000000340)='!@.,-^\x00', &(0x7f0000000380)='iso9660\x00'], &(0x7f0000000580)=[&(0x7f0000000400)='iso9660\x00', &(0x7f0000000440)='iso9660\x00', &(0x7f0000000480)='iso9660\x00', &(0x7f00000004c0)='$\x00', &(0x7f0000000500)='iso9660\x00', &(0x7f0000000540)='{-!#-([\x00']) [ 83.144627][ T3900] FAULT_INJECTION: forcing a failure. [ 83.144627][ T3900] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 83.157750][ T3900] CPU: 0 PID: 3900 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 83.166084][ T3900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 83.176139][ T3900] Call Trace: [ 83.179423][ T3900] [ 83.182352][ T3900] dump_stack_lvl+0xd6/0x122 [ 83.186955][ T3900] dump_stack+0x11/0x1b [ 83.191114][ T3900] should_fail+0x23c/0x250 [ 83.195535][ T3900] should_fail_usercopy+0x16/0x20 [ 83.200567][ T3900] strncpy_from_user+0x21/0x250 [ 83.205424][ T3900] getname_flags+0xb8/0x3f0 [ 83.209963][ T3900] ? should_fail+0xd6/0x250 [ 83.210278][ T3912] FAULT_INJECTION: forcing a failure. [ 83.210278][ T3912] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 83.214471][ T3900] user_path_at_empty+0x28/0x110 [ 83.214496][ T3900] __se_sys_mount+0x217/0x2f0 [ 83.237077][ T3900] ? do_user_addr_fault+0x7d4/0xb90 [ 83.242269][ T3900] __x64_sys_mount+0x63/0x70 [ 83.246873][ T3900] do_syscall_64+0x44/0xd0 [ 83.251281][ T3900] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 83.257169][ T3900] RIP: 0033:0x7fa003fe751a [ 83.261573][ T3900] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 83.281164][ T3900] RSP: 002b:00007fa00315bf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 83.290084][ T3900] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa003fe751a [ 83.298041][ T3900] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 83.305996][ T3900] RBP: 00007fa00315c020 R08: 00007fa00315c020 R09: 00000000200000c0 [ 83.313953][ T3900] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 83.321908][ T3900] R13: 0000000020000000 R14: 00007fa00315bfe0 R15: 000000002001b240 [ 83.329868][ T3900] [ 83.332875][ T3912] CPU: 1 PID: 3912 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller #0 [ 83.341201][ T3912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 83.351256][ T3912] Call Trace: [ 83.354523][ T3912] [ 83.357438][ T3912] dump_stack_lvl+0xd6/0x122 [ 83.362019][ T3912] dump_stack+0x11/0x1b [ 83.366160][ T3912] should_fail+0x23c/0x250 [ 83.370573][ T3912] should_fail_usercopy+0x16/0x20 [ 83.375586][ T3912] strncpy_from_user+0x21/0x250 [ 83.380423][ T3912] getname_flags+0xb8/0x3f0 [ 83.384914][ T3912] ? should_fail+0xd6/0x250 [ 83.389400][ T3912] user_path_at_empty+0x28/0x110 [ 83.394327][ T3912] __se_sys_mount+0x217/0x2f0 [ 83.398994][ T3912] ? do_user_addr_fault+0x7d4/0xb90 [ 83.404178][ T3912] __x64_sys_mount+0x63/0x70 [ 83.408757][ T3912] do_syscall_64+0x44/0xd0 [ 83.413164][ T3912] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 83.419047][ T3912] RIP: 0033:0x7f705094751a [ 83.423449][ T3912] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 12:22:34 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)=@getchain={0x54, 0x66, 0x200, 0x70bd2b, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0xfff1, 0xd}, {0x4, 0x4}}, [{0x8, 0xb, 0x2}, {0x8, 0xb, 0x400}, {0x8}, {0x8, 0xb, 0xb3}, {0x8, 0xb, 0x67}, {0x8, 0xb, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x40044}, 0x2) 12:22:34 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 9) [ 83.443052][ T3912] RSP: 002b:00007f704fabbf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 83.451447][ T3912] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f705094751a [ 83.459401][ T3912] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 83.467357][ T3912] RBP: 00007f704fabc020 R08: 00007f704fabc020 R09: 00000000200000c0 [ 83.475315][ T3912] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 83.483276][ T3912] R13: 0000000020000000 R14: 00007f704fabbfe0 R15: 000000002001b240 [ 83.491237][ T3912] [ 83.512805][ T24] kauditd_printk_skb: 29 callbacks suppressed [ 83.512817][ T24] audit: type=1400 audit(1642422154.313:184): avc: denied { unlink } for pid=1421 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 83.519176][ T3925] FAULT_INJECTION: forcing a failure. [ 83.519176][ T3925] name failslab, interval 1, probability 0, space 0, times 0 [ 83.553946][ T3925] CPU: 0 PID: 3925 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 12:22:34 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 9) 12:22:34 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async, rerun: 32) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)=@getchain={0x54, 0x66, 0x200, 0x70bd2b, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0xfff1, 0xd}, {0x4, 0x4}}, [{0x8, 0xb, 0x2}, {0x8, 0xb, 0x400}, {0x8}, {0x8, 0xb, 0xb3}, {0x8, 0xb, 0x67}, {0x8, 0xb, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x40044}, 0x2) 12:22:34 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:34 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) [ 83.562276][ T3925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 83.572344][ T3925] Call Trace: [ 83.575624][ T3925] [ 83.578546][ T3925] dump_stack_lvl+0xd6/0x122 [ 83.583142][ T3925] dump_stack+0x11/0x1b [ 83.587316][ T3925] should_fail+0x23c/0x250 [ 83.591739][ T3925] ? alloc_fs_context+0x46/0x500 [ 83.596680][ T3925] __should_failslab+0x81/0x90 [ 83.599799][ T3927] FAULT_INJECTION: forcing a failure. [ 83.599799][ T3927] name failslab, interval 1, probability 0, space 0, times 0 [ 83.601512][ T3925] should_failslab+0x5/0x20 [ 83.601537][ T3925] kmem_cache_alloc_trace+0x52/0x350 [ 83.623840][ T3925] alloc_fs_context+0x46/0x500 [ 83.628596][ T3925] ? security_capable+0x91/0xa0 [ 83.633434][ T3925] fs_context_for_reconfigure+0x42/0x50 [ 83.639053][ T3925] path_mount+0x120d/0x1c40 [ 83.643644][ T3925] __se_sys_mount+0x24b/0x2f0 [ 83.648429][ T3925] ? do_user_addr_fault+0x7d4/0xb90 [ 83.653626][ T3925] __x64_sys_mount+0x63/0x70 [ 83.658205][ T3925] do_syscall_64+0x44/0xd0 [ 83.662656][ T3925] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 83.668600][ T3925] RIP: 0033:0x7fa003fe751a [ 83.673006][ T3925] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 83.692615][ T3925] RSP: 002b:00007fa00315bf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 83.701048][ T3925] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa003fe751a [ 83.709066][ T3925] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 83.717101][ T3925] RBP: 00007fa00315c020 R08: 00007fa00315c020 R09: 00000000200000c0 [ 83.725069][ T3925] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 83.733028][ T3925] R13: 0000000020000000 R14: 00007fa00315bfe0 R15: 000000002001b240 [ 83.741076][ T3925] [ 83.744104][ T3927] CPU: 1 PID: 3927 Comm: syz-executor.5 Not tainted 5.16.0-syzkaller #0 [ 83.752434][ T3927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 83.762575][ T3927] Call Trace: [ 83.765857][ T3927] [ 83.768790][ T3927] dump_stack_lvl+0xd6/0x122 [ 83.773384][ T3927] dump_stack+0x11/0x1b [ 83.777538][ T3927] should_fail+0x23c/0x250 [ 83.781950][ T3927] ? getname_flags+0x84/0x3f0 [ 83.786607][ T3927] __should_failslab+0x81/0x90 [ 83.791353][ T3927] should_failslab+0x5/0x20 [ 83.795846][ T3927] kmem_cache_alloc+0x4f/0x320 [ 83.800594][ T3927] getname_flags+0x84/0x3f0 [ 83.805076][ T3927] ? should_fail+0xd6/0x250 [ 83.809561][ T3927] user_path_at_empty+0x28/0x110 [ 83.814498][ T3927] __se_sys_mount+0x217/0x2f0 [ 83.819162][ T3927] ? do_user_addr_fault+0x7d4/0xb90 [ 83.824342][ T3927] __x64_sys_mount+0x63/0x70 [ 83.828911][ T3927] do_syscall_64+0x44/0xd0 [ 83.833312][ T3927] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 83.839191][ T3927] RIP: 0033:0x7f9e4a6e851a [ 83.843582][ T3927] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 83.863256][ T3927] RSP: 002b:00007f9e4985cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 83.871652][ T3927] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9e4a6e851a [ 83.879602][ T3927] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 83.887558][ T3927] RBP: 00007f9e4985d020 R08: 00007f9e4985d020 R09: 00000000200000c0 [ 83.895508][ T3927] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 83.903460][ T3927] R13: 0000000020000000 R14: 00007f9e4985cfe0 R15: 000000002001b240 [ 83.911413][ T3927] 12:22:34 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 8) 12:22:34 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 10) 12:22:34 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)=@getchain={0x54, 0x66, 0x200, 0x70bd2b, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0xfff1, 0xd}, {0x4, 0x4}}, [{0x8, 0xb, 0x2}, {0x8, 0xb, 0x400}, {0x8}, {0x8, 0xb, 0xb3}, {0x8, 0xb, 0x67}, {0x8, 0xb, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x40044}, 0x2) 12:22:34 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) [ 83.937396][ T3937] FAULT_INJECTION: forcing a failure. [ 83.937396][ T3937] name failslab, interval 1, probability 0, space 0, times 0 [ 83.950106][ T3937] CPU: 0 PID: 3937 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller #0 [ 83.958525][ T3937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 83.968602][ T3937] Call Trace: [ 83.971875][ T3937] [ 83.974268][ T3940] FAULT_INJECTION: forcing a failure. [ 83.974268][ T3940] name failslab, interval 1, probability 0, space 0, times 0 [ 83.974803][ T3937] dump_stack_lvl+0xd6/0x122 [ 83.974888][ T3937] dump_stack+0x11/0x1b [ 83.996223][ T3937] should_fail+0x23c/0x250 [ 84.000633][ T3937] ? alloc_fs_context+0x46/0x500 [ 84.005567][ T3937] __should_failslab+0x81/0x90 [ 84.010425][ T3937] should_failslab+0x5/0x20 [ 84.014945][ T3937] kmem_cache_alloc_trace+0x52/0x350 [ 84.020326][ T3937] alloc_fs_context+0x46/0x500 [ 84.025075][ T3937] ? security_capable+0x91/0xa0 [ 84.029943][ T3937] fs_context_for_reconfigure+0x42/0x50 [ 84.035822][ T3937] path_mount+0x120d/0x1c40 [ 84.040330][ T3937] __se_sys_mount+0x24b/0x2f0 [ 84.045054][ T3937] ? do_user_addr_fault+0x7d4/0xb90 [ 84.050241][ T3937] __x64_sys_mount+0x63/0x70 [ 84.054818][ T3937] do_syscall_64+0x44/0xd0 [ 84.059223][ T3937] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 84.065134][ T3937] RIP: 0033:0x7f705094751a [ 84.069553][ T3937] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 84.089481][ T3937] RSP: 002b:00007f704fabbf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 84.098137][ T3937] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f705094751a [ 84.106103][ T3937] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 84.114097][ T3937] RBP: 00007f704fabc020 R08: 00007f704fabc020 R09: 00000000200000c0 [ 84.122096][ T3937] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 84.130119][ T3937] R13: 0000000020000000 R14: 00007f704fabbfe0 R15: 000000002001b240 12:22:34 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 10) 12:22:34 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 1) 12:22:34 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) mount$9p_xen(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1000002, &(0x7f0000000200)={'trans=xen,', {[{@version_u}, {@cache_loose}, {@cache_fscache}, {@noextend}, {@access_client}], [{@subj_role}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x36, 0x61, 0x39, 0x33, 0x61, 0x36, 0x65], 0x2d, [0x31, 0x38, 0x63], 0x2d, [0x62, 0x32, 0x64, 0x30], 0x2d, [0x39, 0x32, 0x63, 0x64], 0x2d, [0x37, 0x35, 0x39, 0x64, 0x63, 0x31, 0x35, 0x34]}}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@seclabel}, {@obj_user={'obj_user', 0x3d, 'iso9660\x00'}}, {@subj_type={'subj_type', 0x3d, 'iso9660\x00'}}, {@pcr={'pcr', 0x3d, 0x32}}]}}) [ 84.138173][ T3937] [ 84.141221][ T3940] CPU: 1 PID: 3940 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 84.149578][ T3940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 84.159629][ T3940] Call Trace: [ 84.162903][ T3940] [ 84.165896][ T3940] dump_stack_lvl+0xd6/0x122 [ 84.170500][ T3940] dump_stack+0x11/0x1b 12:22:35 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async) mount$9p_xen(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1000002, &(0x7f0000000200)={'trans=xen,', {[{@version_u}, {@cache_loose}, {@cache_fscache}, {@noextend}, {@access_client}], [{@subj_role}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x36, 0x61, 0x39, 0x33, 0x61, 0x36, 0x65], 0x2d, [0x31, 0x38, 0x63], 0x2d, [0x62, 0x32, 0x64, 0x30], 0x2d, [0x39, 0x32, 0x63, 0x64], 0x2d, [0x37, 0x35, 0x39, 0x64, 0x63, 0x31, 0x35, 0x34]}}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@seclabel}, {@obj_user={'obj_user', 0x3d, 'iso9660\x00'}}, {@subj_type={'subj_type', 0x3d, 'iso9660\x00'}}, {@pcr={'pcr', 0x3d, 0x32}}]}}) 12:22:35 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) mount$9p_xen(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1000002, &(0x7f0000000200)={'trans=xen,', {[{@version_u}, {@cache_loose}, {@cache_fscache}, {@noextend}, {@access_client}], [{@subj_role}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x36, 0x61, 0x39, 0x33, 0x61, 0x36, 0x65], 0x2d, [0x31, 0x38, 0x63], 0x2d, [0x62, 0x32, 0x64, 0x30], 0x2d, [0x39, 0x32, 0x63, 0x64], 0x2d, [0x37, 0x35, 0x39, 0x64, 0x63, 0x31, 0x35, 0x34]}}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@seclabel}, {@obj_user={'obj_user', 0x3d, 'iso9660\x00'}}, {@subj_type={'subj_type', 0x3d, 'iso9660\x00'}}, {@pcr={'pcr', 0x3d, 0x32}}]}}) [ 84.174521][ T24] audit: type=1400 audit(1642422154.973:185): avc: denied { module_request } for pid=3942 comm="syz-executor.4" kmod="9p-xen" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 84.174717][ T3940] should_fail+0x23c/0x250 [ 84.200636][ T3940] ? ext4_init_fs_context+0x21/0x50 [ 84.205709][ T3943] 9pnet: Could not find request transport: xen [ 84.205927][ T3940] __should_failslab+0x81/0x90 [ 84.217036][ T3940] should_failslab+0x5/0x20 [ 84.221546][ T3940] kmem_cache_alloc_trace+0x52/0x350 [ 84.226928][ T3940] ? kmem_cache_alloc_trace+0x24b/0x350 [ 84.232477][ T3940] ext4_init_fs_context+0x21/0x50 12:22:35 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KDFONTOP_SET(r0, 0x7040, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000000c0)={0x5, 0x0, 0x40000, {r0}}, 0x20) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KDFONTOP_SET(r1, 0x7040, 0x0) write$P9_RCLUNK(r1, &(0x7f0000000180)={0x7, 0x79, 0x2}, 0x7) [ 84.237503][ T3940] alloc_fs_context+0x419/0x500 [ 84.242375][ T3940] fs_context_for_reconfigure+0x42/0x50 [ 84.247925][ T3940] path_mount+0x120d/0x1c40 [ 84.252435][ T3940] __se_sys_mount+0x24b/0x2f0 [ 84.257210][ T3940] ? do_user_addr_fault+0x7d4/0xb90 [ 84.259056][ T3950] 9pnet: Could not find request transport: xen [ 84.262479][ T3940] __x64_sys_mount+0x63/0x70 [ 84.262503][ T3940] do_syscall_64+0x44/0xd0 [ 84.277622][ T3940] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 84.283605][ T3940] RIP: 0033:0x7fa003fe751a 12:22:35 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async, rerun: 32) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (rerun: 32) ioctl$KDFONTOP_SET(r0, 0x7040, 0x0) (async) mount_setattr(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000000c0)={0x5, 0x0, 0x40000, {r0}}, 0x20) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async, rerun: 32) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (rerun: 32) ioctl$KDFONTOP_SET(r1, 0x7040, 0x0) (async) write$P9_RCLUNK(r1, &(0x7f0000000180)={0x7, 0x79, 0x2}, 0x7) 12:22:35 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KDFONTOP_SET(r0, 0x7040, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000000c0)={0x5, 0x0, 0x40000, {r0}}, 0x20) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KDFONTOP_SET(r1, 0x7040, 0x0) write$P9_RCLUNK(r1, &(0x7f0000000180)={0x7, 0x79, 0x2}, 0x7) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$KDFONTOP_SET(r0, 0x7040, 0x0) (async) mount_setattr(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000000c0)={0x5, 0x0, 0x40000, {r0}}, 0x20) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$KDFONTOP_SET(r1, 0x7040, 0x0) (async) write$P9_RCLUNK(r1, &(0x7f0000000180)={0x7, 0x79, 0x2}, 0x7) (async) [ 84.288069][ T3940] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 84.307684][ T3940] RSP: 002b:00007fa00315bf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 84.316125][ T3940] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa003fe751a [ 84.324108][ T3940] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 84.332079][ T3940] RBP: 00007fa00315c020 R08: 00007fa00315c020 R09: 00000000200000c0 [ 84.340059][ T3940] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 84.348080][ T3940] R13: 0000000020000000 R14: 00007fa00315bfe0 R15: 000000002001b240 [ 84.356059][ T3940] [ 84.372461][ T3968] FAULT_INJECTION: forcing a failure. [ 84.372461][ T3968] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 84.374398][ T3971] FAULT_INJECTION: forcing a failure. [ 84.374398][ T3971] name failslab, interval 1, probability 0, space 0, times 0 [ 84.385573][ T3968] CPU: 0 PID: 3968 Comm: syz-executor.5 Not tainted 5.16.0-syzkaller #0 [ 84.406406][ T3968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 84.416534][ T3968] Call Trace: [ 84.419807][ T3968] [ 84.422732][ T3968] dump_stack_lvl+0xd6/0x122 [ 84.427321][ T3968] dump_stack+0x11/0x1b [ 84.431465][ T3968] should_fail+0x23c/0x250 [ 84.435867][ T3968] should_fail_usercopy+0x16/0x20 [ 84.440877][ T3968] strncpy_from_user+0x21/0x250 [ 84.445718][ T3968] getname_flags+0xb8/0x3f0 [ 84.450206][ T3968] ? should_fail+0xd6/0x250 [ 84.454700][ T3968] user_path_at_empty+0x28/0x110 [ 84.459623][ T3968] __se_sys_mount+0x217/0x2f0 [ 84.464289][ T3968] ? do_user_addr_fault+0x7d4/0xb90 [ 84.469474][ T3968] __x64_sys_mount+0x63/0x70 [ 84.474056][ T3968] do_syscall_64+0x44/0xd0 [ 84.478465][ T3968] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 84.484348][ T3968] RIP: 0033:0x7f9e4a6e851a [ 84.488751][ T3968] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 84.508343][ T3968] RSP: 002b:00007f9e4985cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 84.516749][ T3968] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9e4a6e851a [ 84.524704][ T3968] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 84.532661][ T3968] RBP: 00007f9e4985d020 R08: 00007f9e4985d020 R09: 00000000200000c0 [ 84.540615][ T3968] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 84.548572][ T3968] R13: 0000000020000000 R14: 00007f9e4985cfe0 R15: 000000002001b240 [ 84.556532][ T3968] [ 84.559560][ T3971] CPU: 1 PID: 3971 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller #0 [ 84.567959][ T3971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 84.578017][ T3971] Call Trace: [ 84.581297][ T3971] [ 84.584224][ T3971] dump_stack_lvl+0xd6/0x122 12:22:35 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 9) [ 84.588839][ T3971] dump_stack+0x11/0x1b [ 84.593004][ T3971] should_fail+0x23c/0x250 [ 84.597438][ T3971] ? ext4_init_fs_context+0x21/0x50 [ 84.598587][ T3972] FAULT_INJECTION: forcing a failure. [ 84.598587][ T3972] name failslab, interval 1, probability 0, space 0, times 0 [ 84.602664][ T3971] __should_failslab+0x81/0x90 [ 84.620031][ T3971] should_failslab+0x5/0x20 [ 84.624527][ T3971] kmem_cache_alloc_trace+0x52/0x350 [ 84.629824][ T3971] ? kmem_cache_alloc_trace+0x24b/0x350 [ 84.635359][ T3971] ext4_init_fs_context+0x21/0x50 [ 84.640448][ T3971] alloc_fs_context+0x419/0x500 [ 84.645291][ T3971] fs_context_for_reconfigure+0x42/0x50 [ 84.650831][ T3971] path_mount+0x120d/0x1c40 [ 84.655320][ T3971] __se_sys_mount+0x24b/0x2f0 [ 84.660004][ T3971] ? do_user_addr_fault+0x7d4/0xb90 [ 84.665196][ T3971] __x64_sys_mount+0x63/0x70 [ 84.669772][ T3971] do_syscall_64+0x44/0xd0 [ 84.674250][ T3971] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 84.680139][ T3971] RIP: 0033:0x7f705094751a [ 84.684538][ T3971] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 84.704177][ T3971] RSP: 002b:00007f704fabbf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 84.712668][ T3971] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f705094751a [ 84.720713][ T3971] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 84.728666][ T3971] RBP: 00007f704fabc020 R08: 00007f704fabc020 R09: 00000000200000c0 [ 84.736633][ T3971] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 84.744690][ T3971] R13: 0000000020000000 R14: 00007f704fabbfe0 R15: 000000002001b240 [ 84.752690][ T3971] [ 84.755703][ T3972] CPU: 0 PID: 3972 Comm: syz-executor.1 Not tainted 5.16.0-syzkaller #0 [ 84.764335][ T3972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 84.774387][ T3972] Call Trace: [ 84.777653][ T3972] [ 84.780573][ T3972] dump_stack_lvl+0xd6/0x122 [ 84.785216][ T3972] dump_stack+0x11/0x1b [ 84.789396][ T3972] should_fail+0x23c/0x250 [ 84.793845][ T3972] ? getname_flags+0x84/0x3f0 [ 84.798540][ T3972] __should_failslab+0x81/0x90 [ 84.803292][ T3972] should_failslab+0x5/0x20 [ 84.807792][ T3972] kmem_cache_alloc+0x4f/0x320 [ 84.812547][ T3972] getname_flags+0x84/0x3f0 [ 84.817035][ T3972] __x64_sys_mkdir+0x31/0x50 [ 84.821630][ T3972] do_syscall_64+0x44/0xd0 [ 84.826085][ T3972] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 84.831979][ T3972] RIP: 0033:0x7f4792e070f7 [ 84.836377][ T3972] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 84.856010][ T3972] RSP: 002b:00007f4791f7df88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 84.864468][ T3972] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4792e070f7 [ 84.872576][ T3972] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000000 [ 84.880538][ T3972] RBP: 00007f4791f7e020 R08: 0000000000000000 R09: 000000000001c4a6 12:22:35 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 11) 12:22:35 executing program 4: modify_ldt$write2(0x11, &(0x7f0000000040)={0x8001, 0xffffffffffffffff, 0x4000, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1}, 0x10) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f00000000c0)={0x1, 0x1000, 0x1000, 0x0, 0x3, 0x1, 0x0, 0x1}, 0x10) 12:22:35 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:35 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 11) 12:22:35 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 2) 12:22:35 executing program 4: modify_ldt$write2(0x11, &(0x7f0000000040)={0x8001, 0xffffffffffffffff, 0x4000, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1}, 0x10) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f00000000c0)={0x1, 0x1000, 0x1000, 0x0, 0x3, 0x1, 0x0, 0x1}, 0x10) [ 84.888511][ T3972] R10: 00000000200000c0 R11: 0000000000000246 R12: 00000000200000c0 [ 84.896468][ T3972] R13: 0000000020000000 R14: 00007f4791f7dfe0 R15: 000000002001b240 [ 84.904446][ T3972] [ 84.947764][ T3980] FAULT_INJECTION: forcing a failure. [ 84.947764][ T3980] name failslab, interval 1, probability 0, space 0, times 0 [ 84.960470][ T3980] CPU: 1 PID: 3980 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 84.961622][ T3982] FAULT_INJECTION: forcing a failure. [ 84.961622][ T3982] name failslab, interval 1, probability 0, space 0, times 0 [ 84.968812][ T3980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 84.968825][ T3980] Call Trace: [ 84.968832][ T3980] [ 84.968838][ T3980] dump_stack_lvl+0xd6/0x122 [ 85.002265][ T3980] dump_stack+0x11/0x1b [ 85.006417][ T3980] should_fail+0x23c/0x250 [ 85.010876][ T3980] ? generic_parse_monolithic+0x142/0x1d0 [ 85.016647][ T3980] __should_failslab+0x81/0x90 [ 85.021560][ T3980] should_failslab+0x5/0x20 [ 85.026151][ T3980] __kmalloc_track_caller+0x6d/0x370 [ 85.031426][ T3980] kmemdup_nul+0x27/0x70 [ 85.035677][ T3980] generic_parse_monolithic+0x142/0x1d0 [ 85.041273][ T3980] parse_monolithic_mount_data+0x3e/0x50 [ 85.046979][ T3980] path_mount+0x125d/0x1c40 [ 85.051556][ T3980] __se_sys_mount+0x24b/0x2f0 [ 85.056570][ T3980] ? do_user_addr_fault+0x7d4/0xb90 [ 85.061803][ T3980] __x64_sys_mount+0x63/0x70 [ 85.066468][ T3980] do_syscall_64+0x44/0xd0 [ 85.070991][ T3980] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 85.076892][ T3980] RIP: 0033:0x7fa003fe751a [ 85.081302][ T3980] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 85.100897][ T3980] RSP: 002b:00007fa00315bf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 85.109295][ T3980] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa003fe751a [ 85.117255][ T3980] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 85.125213][ T3980] RBP: 00007fa00315c020 R08: 00007fa00315c020 R09: 00000000200000c0 [ 85.133181][ T3980] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 85.141147][ T3980] R13: 0000000020000000 R14: 00007fa00315bfe0 R15: 000000002001b240 [ 85.149118][ T3980] [ 85.152126][ T3982] CPU: 0 PID: 3982 Comm: syz-executor.5 Not tainted 5.16.0-syzkaller #0 [ 85.160454][ T3982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 85.170507][ T3982] Call Trace: [ 85.173795][ T3982] [ 85.176775][ T3982] dump_stack_lvl+0xd6/0x122 [ 85.181378][ T3982] dump_stack+0x11/0x1b [ 85.181460][ T3988] FAULT_INJECTION: forcing a failure. [ 85.181460][ T3988] name failslab, interval 1, probability 0, space 0, times 0 [ 85.185566][ T3982] should_fail+0x23c/0x250 [ 85.185589][ T3982] ? alloc_fs_context+0x46/0x500 [ 85.185609][ T3982] __should_failslab+0x81/0x90 [ 85.212304][ T3982] should_failslab+0x5/0x20 [ 85.216863][ T3982] kmem_cache_alloc_trace+0x52/0x350 [ 85.222140][ T3982] alloc_fs_context+0x46/0x500 [ 85.226899][ T3982] ? security_capable+0x91/0xa0 [ 85.231737][ T3982] fs_context_for_reconfigure+0x42/0x50 [ 85.237348][ T3982] path_mount+0x120d/0x1c40 [ 85.241931][ T3982] __se_sys_mount+0x24b/0x2f0 [ 85.246607][ T3982] ? do_user_addr_fault+0x7d4/0xb90 [ 85.251975][ T3982] __x64_sys_mount+0x63/0x70 [ 85.256634][ T3982] do_syscall_64+0x44/0xd0 [ 85.261042][ T3982] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 85.266957][ T3982] RIP: 0033:0x7f9e4a6e851a [ 85.271385][ T3982] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 85.290981][ T3982] RSP: 002b:00007f9e4985cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 12:22:35 executing program 4: modify_ldt$write2(0x11, &(0x7f0000000040)={0x8001, 0xffffffffffffffff, 0x4000, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1}, 0x10) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async, rerun: 64) modify_ldt$write2(0x11, &(0x7f00000000c0)={0x1, 0x1000, 0x1000, 0x0, 0x3, 0x1, 0x0, 0x1}, 0x10) (rerun: 64) [ 85.299381][ T3982] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9e4a6e851a [ 85.307337][ T3982] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 85.315292][ T3982] RBP: 00007f9e4985d020 R08: 00007f9e4985d020 R09: 00000000200000c0 [ 85.323249][ T3982] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 85.331287][ T3982] R13: 0000000020000000 R14: 00007f9e4985cfe0 R15: 000000002001b240 [ 85.339246][ T3982] 12:22:36 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 10) 12:22:36 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 12) [ 85.342316][ T3988] CPU: 1 PID: 3988 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller #0 [ 85.350654][ T3988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 85.360722][ T3988] Call Trace: [ 85.364002][ T3988] [ 85.367029][ T3988] dump_stack_lvl+0xd6/0x122 [ 85.371660][ T3988] dump_stack+0x11/0x1b [ 85.375816][ T3988] should_fail+0x23c/0x250 [ 85.380330][ T3988] ? generic_parse_monolithic+0x142/0x1d0 [ 85.384782][ T3989] EXT4-fs: 7 callbacks suppressed [ 85.384850][ T3989] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 85.386170][ T3988] __should_failslab+0x81/0x90 [ 85.386202][ T3988] should_failslab+0x5/0x20 [ 85.386225][ T3988] __kmalloc_track_caller+0x6d/0x370 [ 85.386285][ T3988] kmemdup_nul+0x27/0x70 [ 85.386308][ T3988] generic_parse_monolithic+0x142/0x1d0 [ 85.386331][ T3988] parse_monolithic_mount_data+0x3e/0x50 [ 85.386384][ T3988] path_mount+0x125d/0x1c40 [ 85.386405][ T3988] __se_sys_mount+0x24b/0x2f0 [ 85.386425][ T3988] ? do_user_addr_fault+0x7d4/0xb90 [ 85.386461][ T3988] __x64_sys_mount+0x63/0x70 [ 85.386481][ T3988] do_syscall_64+0x44/0xd0 [ 85.386505][ T3988] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 85.400836][ T3993] FAULT_INJECTION: forcing a failure. [ 85.400836][ T3993] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 85.402551][ T3988] RIP: 0033:0x7f705094751a [ 85.402568][ T3988] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 85.494063][ T3988] RSP: 002b:00007f704fabbf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 85.502632][ T3988] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f705094751a [ 85.510590][ T3988] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 85.518586][ T3988] RBP: 00007f704fabc020 R08: 00007f704fabc020 R09: 00000000200000c0 [ 85.526546][ T3988] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 85.534748][ T3988] R13: 0000000020000000 R14: 00007f704fabbfe0 R15: 000000002001b240 [ 85.542967][ T3988] 12:22:36 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:36 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 12) 12:22:36 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="c1f8a0"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) 12:22:36 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="c1f8a0"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) [ 85.545973][ T3993] CPU: 0 PID: 3993 Comm: syz-executor.1 Not tainted 5.16.0-syzkaller #0 [ 85.554301][ T3993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 85.564362][ T3993] Call Trace: [ 85.567648][ T3993] [ 85.570587][ T3993] dump_stack_lvl+0xd6/0x122 [ 85.575260][ T3993] dump_stack+0x11/0x1b [ 85.579425][ T3993] should_fail+0x23c/0x250 [ 85.583841][ T3993] should_fail_usercopy+0x16/0x20 [ 85.588891][ T3993] strncpy_from_user+0x21/0x250 [ 85.593748][ T3993] getname_flags+0xb8/0x3f0 12:22:36 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="c1f8a0"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) 12:22:36 executing program 4: mknod$loop(&(0x7f0000000440)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2e2f8ba65a7a66"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x8000, &(0x7f0000000480)=ANY=[@ANYBLOB="6d6f64653d303030303030303030303030303030303030303030313062a0d405653d30303030303030303030303030303030303135363431332c6d6f64653d30303030303030303030303030303030303030303030372c6d6f64653d30303030303030303030303030303030303030303034302c6d6f64653d30303030303030303030303033373737373737373737372c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303133373137312c6d6f64653d27dce730303030303030303030303030303030303030303230302c7365636c6162656c2c736d61636b66736465663d69736f39363630002c61756469742c646f6e745f686173682c646f6e745f686173682c646f6e745f686173682c666f776e65723e", @ANYRESDEC=r0, @ANYBLOB=',measont_xash,\x00\x00\x00\x00\x00\x00']) link(&(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)='./file0\x00') 12:22:36 executing program 4: mknod$loop(&(0x7f0000000440)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2e2f8ba65a7a66"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x8000, &(0x7f0000000480)=ANY=[@ANYBLOB="6d6f64653d303030303030303030303030303030303030303030313062a0d405653d30303030303030303030303030303030303135363431332c6d6f64653d30303030303030303030303030303030303030303030372c6d6f64653d30303030303030303030303030303030303030303034302c6d6f64653d30303030303030303030303033373737373737373737372c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303133373137312c6d6f64653d27dce730303030303030303030303030303030303030303230302c7365636c6162656c2c736d61636b66736465663d69736f39363630002c61756469742c646f6e745f686173682c646f6e745f686173682c646f6e745f686173682c666f776e65723e", @ANYRESDEC=r0, @ANYBLOB=',measont_xash,\x00\x00\x00\x00\x00\x00']) (async, rerun: 64) link(&(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)='./file0\x00') (rerun: 64) [ 85.598257][ T3993] __x64_sys_mkdir+0x31/0x50 [ 85.602918][ T3993] do_syscall_64+0x44/0xd0 [ 85.607348][ T3993] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 85.613250][ T3993] RIP: 0033:0x7f4792e070f7 [ 85.617709][ T3993] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 85.631822][ T4005] bpf: Bad value for 'mode' [ 85.637402][ T3993] RSP: 002b:00007f4791f7df88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 85.637425][ T3993] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4792e070f7 [ 85.637437][ T3993] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000000 [ 85.637501][ T3993] RBP: 00007f4791f7e020 R08: 0000000000000000 R09: 000000000001c4a6 [ 85.637512][ T3993] R10: 00000000200000c0 R11: 0000000000000246 R12: 00000000200000c0 [ 85.682353][ T3993] R13: 0000000020000000 R14: 00007f4791f7dfe0 R15: 000000002001b240 [ 85.690317][ T3993] [ 85.693732][ T3993] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 85.707417][ T4012] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 85.714611][ T4013] FAULT_INJECTION: forcing a failure. [ 85.714611][ T4013] name failslab, interval 1, probability 0, space 0, times 0 [ 85.727299][ T4013] CPU: 0 PID: 4013 Comm: syz-executor.5 Not tainted 5.16.0-syzkaller #0 [ 85.735742][ T4013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 85.738747][ T4016] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 85.745804][ T4013] Call Trace: 12:22:36 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 3) 12:22:36 executing program 4: mknod$loop(&(0x7f0000000440)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2e2f8ba65a7a66"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x8000, &(0x7f0000000480)=ANY=[@ANYBLOB="6d6f64653d303030303030303030303030303030303030303030313062a0d405653d30303030303030303030303030303030303135363431332c6d6f64653d30303030303030303030303030303030303030303030372c6d6f64653d30303030303030303030303030303030303030303034302c6d6f64653d30303030303030303030303033373737373737373737372c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303133373137312c6d6f64653d27dce730303030303030303030303030303030303030303230302c7365636c6162656c2c736d61636b66736465663d69736f39363630002c61756469742c646f6e745f686173682c646f6e745f686173682c646f6e745f686173682c666f776e65723e", @ANYRESDEC=r0, @ANYBLOB=',measont_xash,\x00\x00\x00\x00\x00\x00']) (async) link(&(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)='./file0\x00') [ 85.745813][ T4013] [ 85.745819][ T4013] dump_stack_lvl+0xd6/0x122 [ 85.745846][ T4013] dump_stack+0x11/0x1b [ 85.767145][ T4013] should_fail+0x23c/0x250 [ 85.771387][ T4012] FAULT_INJECTION: forcing a failure. [ 85.771387][ T4012] name failslab, interval 1, probability 0, space 0, times 0 [ 85.771561][ T4013] ? ext4_init_fs_context+0x21/0x50 [ 85.771587][ T4013] __should_failslab+0x81/0x90 [ 85.794131][ T4013] should_failslab+0x5/0x20 [ 85.798707][ T4013] kmem_cache_alloc_trace+0x52/0x350 [ 85.803981][ T4013] ? kmem_cache_alloc_trace+0x24b/0x350 [ 85.809513][ T4013] ext4_init_fs_context+0x21/0x50 [ 85.814581][ T4013] alloc_fs_context+0x419/0x500 [ 85.819446][ T4013] fs_context_for_reconfigure+0x42/0x50 [ 85.824982][ T4013] path_mount+0x120d/0x1c40 [ 85.829471][ T4013] __se_sys_mount+0x24b/0x2f0 [ 85.834138][ T4013] ? do_user_addr_fault+0x7d4/0xb90 [ 85.839324][ T4013] __x64_sys_mount+0x63/0x70 [ 85.843976][ T4013] do_syscall_64+0x44/0xd0 [ 85.848382][ T4013] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 85.854312][ T4013] RIP: 0033:0x7f9e4a6e851a [ 85.858713][ T4013] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 85.878331][ T4013] RSP: 002b:00007f9e4985cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 85.886729][ T4013] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9e4a6e851a [ 85.894717][ T4013] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 85.902674][ T4013] RBP: 00007f9e4985d020 R08: 00007f9e4985d020 R09: 00000000200000c0 [ 85.910631][ T4013] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 85.918600][ T4013] R13: 0000000020000000 R14: 00007f9e4985cfe0 R15: 000000002001b240 [ 85.926561][ T4013] [ 85.929564][ T4012] CPU: 1 PID: 4012 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 85.937948][ T4012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 85.944605][ T4019] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 85.948032][ T4012] Call Trace: [ 85.948041][ T4012] [ 85.948047][ T4012] dump_stack_lvl+0xd6/0x122 [ 85.965135][ T4012] dump_stack+0x11/0x1b [ 85.969732][ T4012] should_fail+0x23c/0x250 [ 85.974185][ T4012] ? getname_flags+0x84/0x3f0 [ 85.978877][ T4012] __should_failslab+0x81/0x90 [ 85.983673][ T4012] should_failslab+0x5/0x20 [ 85.988251][ T4012] kmem_cache_alloc+0x4f/0x320 [ 85.993051][ T4012] getname_flags+0x84/0x3f0 [ 85.997547][ T4012] getname+0x15/0x20 [ 86.001460][ T4012] do_sys_openat2+0x6d/0x2b0 [ 86.006037][ T4012] __x64_sys_openat+0xef/0x110 [ 86.010875][ T4012] do_syscall_64+0x44/0xd0 [ 86.015415][ T4012] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 86.021516][ T4012] RIP: 0033:0x7fa003f98f04 [ 86.025921][ T4012] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 86.045896][ T4012] RSP: 002b:00007fa00315bf10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 12:22:36 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 11) 12:22:36 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) [ 86.054482][ T4012] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa003f98f04 [ 86.062440][ T4012] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 86.070442][ T4012] RBP: 0000000020000000 R08: 0000000000000000 R09: 00000000200000c0 [ 86.078460][ T4012] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 86.086424][ T4012] R13: 0000000020000000 R14: 00007fa00315bfe0 R15: 000000002001b240 [ 86.094468][ T4012] [ 86.098403][ T4018] bpf: Bad value for 'mode' 12:22:36 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 13) [ 86.104163][ T4019] FAULT_INJECTION: forcing a failure. [ 86.104163][ T4019] name failslab, interval 1, probability 0, space 0, times 0 [ 86.116994][ T4019] CPU: 0 PID: 4019 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller #0 [ 86.125358][ T4019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 86.125650][ T4023] FAULT_INJECTION: forcing a failure. [ 86.125650][ T4023] name failslab, interval 1, probability 0, space 0, times 0 [ 86.135413][ T4019] Call Trace: [ 86.135422][ T4019] [ 86.135429][ T4019] dump_stack_lvl+0xd6/0x122 [ 86.158840][ T4019] dump_stack+0x11/0x1b [ 86.162995][ T4019] should_fail+0x23c/0x250 [ 86.167441][ T4019] ? getname_flags+0x84/0x3f0 [ 86.172111][ T4019] __should_failslab+0x81/0x90 [ 86.176868][ T4019] should_failslab+0x5/0x20 [ 86.181387][ T4019] kmem_cache_alloc+0x4f/0x320 [ 86.186168][ T4019] getname_flags+0x84/0x3f0 [ 86.190765][ T4019] getname+0x15/0x20 [ 86.194718][ T4019] do_sys_openat2+0x6d/0x2b0 [ 86.199324][ T4019] __x64_sys_openat+0xef/0x110 [ 86.204082][ T4019] do_syscall_64+0x44/0xd0 [ 86.208493][ T4019] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 86.214394][ T4019] RIP: 0033:0x7f70508f8f04 [ 86.218798][ T4019] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 86.238402][ T4019] RSP: 002b:00007f704fabbf10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 86.246804][ T4019] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f70508f8f04 [ 86.254847][ T4019] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 86.262811][ T4019] RBP: 0000000020000000 R08: 0000000000000000 R09: 00000000200000c0 [ 86.270772][ T4019] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 86.278726][ T4019] R13: 0000000020000000 R14: 00007f704fabbfe0 R15: 000000002001b240 [ 86.286704][ T4019] [ 86.289715][ T4023] CPU: 1 PID: 4023 Comm: syz-executor.1 Not tainted 5.16.0-syzkaller #0 [ 86.298051][ T4023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 12:22:37 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x100, 0x40) 12:22:37 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 13) 12:22:37 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x100, 0x40) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async) open$dir(&(0x7f0000000040)='./file0\x00', 0x100, 0x40) (async) 12:22:37 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async, rerun: 32) open$dir(&(0x7f0000000040)='./file0\x00', 0x100, 0x40) (rerun: 32) [ 86.308102][ T4023] Call Trace: [ 86.311378][ T4023] [ 86.314315][ T4023] dump_stack_lvl+0xd6/0x122 [ 86.318910][ T4023] dump_stack+0x11/0x1b [ 86.323075][ T4023] should_fail+0x23c/0x250 [ 86.327495][ T4023] ? strndup_user+0x64/0xa0 [ 86.332005][ T4023] __should_failslab+0x81/0x90 [ 86.336785][ T4023] should_failslab+0x5/0x20 [ 86.341307][ T4023] __kmalloc_track_caller+0x6d/0x370 [ 86.346630][ T4023] memdup_user+0x22/0xb0 [ 86.350881][ T4023] strndup_user+0x64/0xa0 [ 86.355308][ T4023] __se_sys_mount+0x4e/0x2f0 12:22:37 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2e2f66c96ad817b88138989540caba2a4cd92aae47edd618ba3f39ee8832880956cbebbeffa3b3e2fffb661e016fbdfbc8f578a91f66cd8913a5770e7e09d2e8736edd87df79eb3b59858ebd00275bb1be97f7bd38d1f491d9b64e7b9126d4457cd1dcbb726de0505646b2c3267e6b5fc96c1e62a966e358bd9e413f5f9099e3c9cae269ce61b0723822b8e49a54aac0c2c58490f2460d2dddb0a1b6b83ea93fb0206474f0d0437ef2451aa13c651e150e596923a257598862c5aa8da55b41074666dbe808d45824dd6b303f429c4258c6088fe5fb068ad3cc87423b123d0531bd9600000000f0667b15e623819d"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) 12:22:37 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2e2f66c96ad817b88138989540caba2a4cd92aae47edd618ba3f39ee8832880956cbebbeffa3b3e2fffb661e016fbdfbc8f578a91f66cd8913a5770e7e09d2e8736edd87df79eb3b59858ebd00275bb1be97f7bd38d1f491d9b64e7b9126d4457cd1dcbb726de0505646b2c3267e6b5fc96c1e62a966e358bd9e413f5f9099e3c9cae269ce61b0723822b8e49a54aac0c2c58490f2460d2dddb0a1b6b83ea93fb0206474f0d0437ef2451aa13c651e150e596923a257598862c5aa8da55b41074666dbe808d45824dd6b303f429c4258c6088fe5fb068ad3cc87423b123d0531bd9600000000f0667b15e623819d"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) 12:22:37 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2e2f66c96ad817b88138989540caba2a4cd92aae47edd618ba3f39ee8832880956cbebbeffa3b3e2fffb661e016fbdfbc8f578a91f66cd8913a5770e7e09d2e8736edd87df79eb3b59858ebd00275bb1be97f7bd38d1f491d9b64e7b9126d4457cd1dcbb726de0505646b2c3267e6b5fc96c1e62a966e358bd9e413f5f9099e3c9cae269ce61b0723822b8e49a54aac0c2c58490f2460d2dddb0a1b6b83ea93fb0206474f0d0437ef2451aa13c651e150e596923a257598862c5aa8da55b41074666dbe808d45824dd6b303f429c4258c6088fe5fb068ad3cc87423b123d0531bd9600000000f0667b15e623819d"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) [ 86.359907][ T4023] ? do_user_addr_fault+0x7d4/0xb90 [ 86.365106][ T4023] __x64_sys_mount+0x63/0x70 [ 86.369697][ T4023] do_syscall_64+0x44/0xd0 [ 86.374116][ T4023] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 86.380110][ T4023] RIP: 0033:0x7f4792e0951a [ 86.384529][ T4023] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 86.404222][ T4023] RSP: 002b:00007f4791f7df88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 86.412637][ T4023] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4792e0951a [ 86.420608][ T4023] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 86.428579][ T4023] RBP: 00007f4791f7e020 R08: 00007f4791f7e020 R09: 00000000200000c0 [ 86.436590][ T4023] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 86.444548][ T4023] R13: 0000000020000000 R14: 00007f4791f7dfe0 R15: 000000002001b240 [ 86.452503][ T4023] 12:22:37 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 4) 12:22:37 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=""/150, 0x96) [ 86.465636][ T4044] FAULT_INJECTION: forcing a failure. [ 86.465636][ T4044] name failslab, interval 1, probability 0, space 0, times 0 [ 86.478291][ T4044] CPU: 1 PID: 4044 Comm: syz-executor.5 Not tainted 5.16.0-syzkaller #0 [ 86.486674][ T4044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 86.496800][ T4044] Call Trace: [ 86.500103][ T4044] [ 86.501325][ T4047] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 86.503035][ T4044] dump_stack_lvl+0xd6/0x122 [ 86.503063][ T4044] dump_stack+0x11/0x1b [ 86.503081][ T4044] should_fail+0x23c/0x250 [ 86.514713][ T4047] FAULT_INJECTION: forcing a failure. [ 86.514713][ T4047] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 86.518094][ T4044] ? generic_parse_monolithic+0x142/0x1d0 [ 86.518121][ T4044] __should_failslab+0x81/0x90 [ 86.518144][ T4044] should_failslab+0x5/0x20 [ 86.550496][ T4044] __kmalloc_track_caller+0x6d/0x370 [ 86.555784][ T4044] kmemdup_nul+0x27/0x70 [ 86.560020][ T4044] generic_parse_monolithic+0x142/0x1d0 [ 86.565654][ T4044] parse_monolithic_mount_data+0x3e/0x50 [ 86.571337][ T4044] path_mount+0x125d/0x1c40 [ 86.575948][ T4044] __se_sys_mount+0x24b/0x2f0 [ 86.580648][ T4044] ? do_user_addr_fault+0x7d4/0xb90 [ 86.585912][ T4044] __x64_sys_mount+0x63/0x70 [ 86.590579][ T4044] do_syscall_64+0x44/0xd0 [ 86.594996][ T4044] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 86.600914][ T4044] RIP: 0033:0x7f9e4a6e851a [ 86.605315][ T4044] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 86.624907][ T4044] RSP: 002b:00007f9e4985cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 86.633320][ T4044] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9e4a6e851a [ 86.641274][ T4044] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 86.649233][ T4044] RBP: 00007f9e4985d020 R08: 00007f9e4985d020 R09: 00000000200000c0 [ 86.657194][ T4044] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 86.665160][ T4044] R13: 0000000020000000 R14: 00007f9e4985cfe0 R15: 000000002001b240 [ 86.673203][ T4044] [ 86.676211][ T4047] CPU: 0 PID: 4047 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller #0 [ 86.684751][ T4047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 86.691293][ T4048] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 86.694877][ T4047] Call Trace: [ 86.694885][ T4047] [ 86.694892][ T4047] dump_stack_lvl+0xd6/0x122 [ 86.701924][ T4048] FAULT_INJECTION: forcing a failure. [ 86.701924][ T4048] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 86.704491][ T4047] dump_stack+0x11/0x1b [ 86.704519][ T4047] should_fail+0x23c/0x250 [ 86.733726][ T4047] should_fail_usercopy+0x16/0x20 [ 86.738875][ T4047] strncpy_from_user+0x21/0x250 [ 86.743722][ T4047] getname_flags+0xb8/0x3f0 [ 86.748217][ T4047] getname+0x15/0x20 [ 86.752113][ T4047] do_sys_openat2+0x6d/0x2b0 [ 86.756691][ T4047] __x64_sys_openat+0xef/0x110 [ 86.761491][ T4047] do_syscall_64+0x44/0xd0 [ 86.765899][ T4047] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 86.771860][ T4047] RIP: 0033:0x7f70508f8f04 [ 86.776263][ T4047] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 86.795952][ T4047] RSP: 002b:00007f704fabbf10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 86.804469][ T4047] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f70508f8f04 12:22:37 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 12) [ 86.812694][ T4047] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 86.820660][ T4047] RBP: 0000000020000000 R08: 0000000000000000 R09: 00000000200000c0 [ 86.828616][ T4047] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 86.836575][ T4047] R13: 0000000020000000 R14: 00007f704fabbfe0 R15: 000000002001b240 [ 86.844538][ T4047] [ 86.847612][ T4048] CPU: 1 PID: 4048 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 86.855944][ T4048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 86.866094][ T4048] Call Trace: [ 86.869447][ T4048] [ 86.872367][ T4048] dump_stack_lvl+0xd6/0x122 [ 86.876960][ T4048] dump_stack+0x11/0x1b [ 86.881101][ T4048] should_fail+0x23c/0x250 [ 86.885534][ T4048] should_fail_usercopy+0x16/0x20 [ 86.890550][ T4048] strncpy_from_user+0x21/0x250 [ 86.895386][ T4048] getname_flags+0xb8/0x3f0 [ 86.899911][ T4048] getname+0x15/0x20 [ 86.903793][ T4048] do_sys_openat2+0x6d/0x2b0 [ 86.908376][ T4048] __x64_sys_openat+0xef/0x110 [ 86.913133][ T4048] do_syscall_64+0x44/0xd0 [ 86.917586][ T4048] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 86.923480][ T4048] RIP: 0033:0x7fa003f98f04 [ 86.927880][ T4048] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 86.947612][ T4048] RSP: 002b:00007fa00315bf10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 86.956099][ T4048] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa003f98f04 [ 86.964144][ T4048] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 86.972102][ T4048] RBP: 0000000020000000 R08: 0000000000000000 R09: 00000000200000c0 [ 86.980061][ T4048] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 86.988171][ T4048] R13: 0000000020000000 R14: 00007fa00315bfe0 R15: 000000002001b240 [ 86.996149][ T4048] [ 87.010414][ T4054] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 87.016736][ T4054] FAULT_INJECTION: forcing a failure. [ 87.016736][ T4054] name failslab, interval 1, probability 0, space 0, times 0 [ 87.029476][ T4054] CPU: 1 PID: 4054 Comm: syz-executor.5 Not tainted 5.16.0-syzkaller #0 [ 87.035961][ T4052] FAULT_INJECTION: forcing a failure. [ 87.035961][ T4052] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 87.037808][ T4054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 87.037821][ T4054] Call Trace: [ 87.064959][ T4054] [ 87.067880][ T4054] dump_stack_lvl+0xd6/0x122 [ 87.072547][ T4054] dump_stack+0x11/0x1b [ 87.076700][ T4054] should_fail+0x23c/0x250 [ 87.081176][ T4054] ? getname_flags+0x84/0x3f0 [ 87.085841][ T4054] __should_failslab+0x81/0x90 [ 87.090649][ T4054] should_failslab+0x5/0x20 [ 87.095153][ T4054] kmem_cache_alloc+0x4f/0x320 [ 87.099964][ T4054] getname_flags+0x84/0x3f0 [ 87.104594][ T4054] getname+0x15/0x20 [ 87.108555][ T4054] do_sys_openat2+0x6d/0x2b0 [ 87.113138][ T4054] __x64_sys_openat+0xef/0x110 [ 87.117956][ T4054] do_syscall_64+0x44/0xd0 [ 87.122405][ T4054] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 87.128416][ T4054] RIP: 0033:0x7f9e4a699f04 [ 87.132826][ T4054] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 87.152535][ T4054] RSP: 002b:00007f9e4985cf10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 87.161023][ T4054] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9e4a699f04 [ 87.169013][ T4054] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 87.176975][ T4054] RBP: 0000000020000000 R08: 0000000000000000 R09: 00000000200000c0 [ 87.185154][ T4054] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 87.193108][ T4054] R13: 0000000020000000 R14: 00007f9e4985cfe0 R15: 000000002001b240 [ 87.201147][ T4054] [ 87.204226][ T4052] CPU: 0 PID: 4052 Comm: syz-executor.1 Not tainted 5.16.0-syzkaller #0 12:22:38 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:38 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 14) 12:22:38 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=""/150, 0x96) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=""/150, 0x96) (async) 12:22:38 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 14) 12:22:38 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 13) [ 87.212649][ T4052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 87.222876][ T4052] Call Trace: [ 87.226158][ T4052] [ 87.229109][ T4052] dump_stack_lvl+0xd6/0x122 [ 87.233710][ T4052] dump_stack+0x11/0x1b [ 87.233805][ T4042] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 87.237872][ T4052] should_fail+0x23c/0x250 [ 87.237897][ T4052] should_fail_usercopy+0x16/0x20 [ 87.237916][ T4052] _copy_from_user+0x1c/0xd0 [ 87.237933][ T4052] memdup_user+0x5b/0xb0 [ 87.237957][ T4052] strndup_user+0x64/0xa0 12:22:38 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=""/150, 0x96) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=""/150, 0x96) (async) 12:22:38 executing program 4: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000040)=0x77, &(0x7f00000000c0)=0x4) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) 12:22:38 executing program 4: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000040)=0x77, &(0x7f00000000c0)=0x4) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000040)=0x77, &(0x7f00000000c0)=0x4) (async) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async) [ 87.237984][ T4052] __se_sys_mount+0x4e/0x2f0 [ 87.271432][ T4052] ? do_user_addr_fault+0x7d4/0xb90 [ 87.276639][ T4052] __x64_sys_mount+0x63/0x70 [ 87.281330][ T4052] do_syscall_64+0x44/0xd0 [ 87.285753][ T4052] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 87.291655][ T4052] RIP: 0033:0x7f4792e0951a [ 87.296075][ T4052] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 12:22:38 executing program 4: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000040)=0x77, &(0x7f00000000c0)=0x4) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000040)=0x77, &(0x7f00000000c0)=0x4) (async) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async) [ 87.315698][ T4052] RSP: 002b:00007f4791f7df88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 87.324122][ T4052] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4792e0951a [ 87.332100][ T4052] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 87.340083][ T4052] RBP: 00007f4791f7e020 R08: 00007f4791f7e020 R09: 00000000200000c0 [ 87.348053][ T4052] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 87.356008][ T4052] R13: 0000000020000000 R14: 00007f4791f7dfe0 R15: 000000002001b240 [ 87.363962][ T4052] [ 87.380800][ T4077] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 87.387128][ T4081] FAULT_INJECTION: forcing a failure. [ 87.387128][ T4081] name failslab, interval 1, probability 0, space 0, times 0 [ 87.391469][ T4077] FAULT_INJECTION: forcing a failure. [ 87.391469][ T4077] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 87.399860][ T4081] CPU: 0 PID: 4081 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 87.399881][ T4081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 87.399891][ T4081] Call Trace: [ 87.399898][ T4081] [ 87.399904][ T4081] dump_stack_lvl+0xd6/0x122 [ 87.442140][ T4081] dump_stack+0x11/0x1b [ 87.446308][ T4081] should_fail+0x23c/0x250 [ 87.450712][ T4081] ? __alloc_file+0x2e/0x1a0 [ 87.455292][ T4081] __should_failslab+0x81/0x90 [ 87.460045][ T4081] should_failslab+0x5/0x20 [ 87.464561][ T4081] kmem_cache_alloc+0x4f/0x320 [ 87.469315][ T4081] __alloc_file+0x2e/0x1a0 [ 87.473719][ T4081] alloc_empty_file+0xcd/0x1c0 [ 87.478469][ T4081] path_openat+0x6a/0x1f30 [ 87.482873][ T4081] ? ___ratelimit+0x25d/0x2b0 [ 87.487541][ T4081] ? debug_smp_processor_id+0x18/0x20 [ 87.492920][ T4081] ? mod_objcg_state+0x490/0x5c0 [ 87.497849][ T4081] ? refill_obj_stock+0x140/0x220 [ 87.502857][ T4081] ? __rcu_read_unlock+0x5c/0x290 [ 87.507869][ T4081] ? __rcu_read_lock+0x32/0x40 [ 87.512683][ T4081] do_filp_open+0x105/0x220 [ 87.517175][ T4081] do_sys_openat2+0xb5/0x2b0 [ 87.521749][ T4081] __x64_sys_openat+0xef/0x110 [ 87.526499][ T4081] do_syscall_64+0x44/0xd0 [ 87.530913][ T4081] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 87.536856][ T4081] RIP: 0033:0x7fa003f98f04 [ 87.541344][ T4081] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 87.561111][ T4081] RSP: 002b:00007fa00315bf10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 87.569511][ T4081] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa003f98f04 [ 87.577470][ T4081] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 87.585432][ T4081] RBP: 0000000020000000 R08: 0000000000000000 R09: 00000000200000c0 [ 87.593389][ T4081] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 87.601433][ T4081] R13: 0000000020000000 R14: 00007fa00315bfe0 R15: 000000002001b240 [ 87.609389][ T4081] [ 87.612395][ T4077] CPU: 1 PID: 4077 Comm: syz-executor.5 Not tainted 5.16.0-syzkaller #0 [ 87.620731][ T4077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 87.630925][ T4077] Call Trace: [ 87.634205][ T4077] [ 87.637134][ T4077] dump_stack_lvl+0xd6/0x122 [ 87.641109][ T4075] FAULT_INJECTION: forcing a failure. [ 87.641109][ T4075] name failslab, interval 1, probability 0, space 0, times 0 [ 87.641729][ T4077] dump_stack+0x11/0x1b [ 87.658468][ T4077] should_fail+0x23c/0x250 [ 87.662884][ T4077] should_fail_usercopy+0x16/0x20 [ 87.667901][ T4077] strncpy_from_user+0x21/0x250 [ 87.672737][ T4077] getname_flags+0xb8/0x3f0 [ 87.677249][ T4077] getname+0x15/0x20 [ 87.681174][ T4077] do_sys_openat2+0x6d/0x2b0 [ 87.685768][ T4077] __x64_sys_openat+0xef/0x110 [ 87.690518][ T4077] do_syscall_64+0x44/0xd0 [ 87.694929][ T4077] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 87.700877][ T4077] RIP: 0033:0x7f9e4a699f04 [ 87.705281][ T4077] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 12:22:38 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 5) 12:22:38 executing program 4: msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) [ 87.725639][ T4077] RSP: 002b:00007f9e4985cf10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 87.734121][ T4077] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9e4a699f04 [ 87.742080][ T4077] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 87.750115][ T4077] RBP: 0000000020000000 R08: 0000000000000000 R09: 00000000200000c0 [ 87.758072][ T4077] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 87.766202][ T4077] R13: 0000000020000000 R14: 00007f9e4985cfe0 R15: 000000002001b240 [ 87.774204][ T4077] 12:22:38 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 15) 12:22:38 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:38 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 14) 12:22:38 executing program 4: msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)) (async) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) [ 87.777210][ T4075] CPU: 0 PID: 4075 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller #0 [ 87.785619][ T4075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 87.795794][ T4075] Call Trace: [ 87.799118][ T4075] [ 87.802124][ T4075] dump_stack_lvl+0xd6/0x122 [ 87.806722][ T4075] dump_stack+0x11/0x1b [ 87.810906][ T4075] should_fail+0x23c/0x250 [ 87.815333][ T4075] ? __alloc_file+0x2e/0x1a0 [ 87.819937][ T4075] __should_failslab+0x81/0x90 [ 87.824791][ T4075] should_failslab+0x5/0x20 [ 87.829306][ T4075] kmem_cache_alloc+0x4f/0x320 [ 87.834160][ T4075] __alloc_file+0x2e/0x1a0 [ 87.838581][ T4075] alloc_empty_file+0xcd/0x1c0 [ 87.843395][ T4075] path_openat+0x6a/0x1f30 [ 87.847818][ T4075] ? ___ratelimit+0x25d/0x2b0 [ 87.852476][ T4075] ? debug_smp_processor_id+0x18/0x20 [ 87.857888][ T4075] ? mod_objcg_state+0x490/0x5c0 [ 87.862816][ T4075] ? refill_obj_stock+0x140/0x220 [ 87.867819][ T4075] ? __rcu_read_unlock+0x5c/0x290 [ 87.872869][ T4075] ? __rcu_read_lock+0x32/0x40 [ 87.877671][ T4075] do_filp_open+0x105/0x220 [ 87.882161][ T4075] do_sys_openat2+0xb5/0x2b0 [ 87.886823][ T4075] __x64_sys_openat+0xef/0x110 [ 87.891615][ T4075] do_syscall_64+0x44/0xd0 [ 87.896013][ T4075] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 87.901894][ T4075] RIP: 0033:0x7f70508f8f04 [ 87.906315][ T4075] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 87.925935][ T4075] RSP: 002b:00007f704fabbf10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 87.934516][ T4075] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f70508f8f04 [ 87.942463][ T4075] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 87.950752][ T4075] RBP: 0000000020000000 R08: 0000000000000000 R09: 00000000200000c0 [ 87.958702][ T4075] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 87.966655][ T4075] R13: 0000000020000000 R14: 00007f704fabbfe0 R15: 000000002001b240 [ 87.974731][ T4075] [ 87.999455][ T4095] FAULT_INJECTION: forcing a failure. [ 87.999455][ T4095] name failslab, interval 1, probability 0, space 0, times 0 [ 88.012137][ T4095] CPU: 1 PID: 4095 Comm: syz-executor.5 Not tainted 5.16.0-syzkaller #0 [ 88.012992][ T4089] FAULT_INJECTION: forcing a failure. [ 88.012992][ T4089] name failslab, interval 1, probability 0, space 0, times 0 [ 88.020462][ T4095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 88.020475][ T4095] Call Trace: [ 88.020481][ T4095] [ 88.049358][ T4095] dump_stack_lvl+0xd6/0x122 [ 88.053945][ T4095] dump_stack+0x11/0x1b [ 88.058093][ T4095] should_fail+0x23c/0x250 [ 88.062496][ T4095] ? __kthread_create_on_node+0x7c/0x260 [ 88.068134][ T4095] __should_failslab+0x81/0x90 [ 88.072889][ T4095] should_failslab+0x5/0x20 [ 88.077403][ T4095] kmem_cache_alloc_trace+0x52/0x350 [ 88.082678][ T4095] ? __rcu_read_unlock+0x5c/0x290 [ 88.087689][ T4095] ? ext4_journalled_writepage_callback+0xf0/0xf0 [ 88.094187][ T4095] __kthread_create_on_node+0x7c/0x260 [ 88.099640][ T4095] ? ext4_journalled_writepage_callback+0xf0/0xf0 [ 88.106051][ T4095] kthread_create_on_node+0x86/0xb0 [ 88.111313][ T4095] ? ext4_register_li_request+0x289/0x430 [ 88.117024][ T4095] ext4_register_li_request+0x2ac/0x430 [ 88.122561][ T4095] ext4_reconfigure+0xe09/0x10e0 [ 88.127491][ T4095] reconfigure_super+0x175/0x540 [ 88.132456][ T4095] path_mount+0x13f9/0x1c40 [ 88.137065][ T4095] __se_sys_mount+0x24b/0x2f0 [ 88.141911][ T4095] ? do_user_addr_fault+0x7d4/0xb90 [ 88.147101][ T4095] __x64_sys_mount+0x63/0x70 [ 88.151697][ T4095] do_syscall_64+0x44/0xd0 [ 88.156185][ T4095] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 88.162088][ T4095] RIP: 0033:0x7f9e4a6e851a [ 88.166491][ T4095] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 88.186087][ T4095] RSP: 002b:00007f9e4985cf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 88.194492][ T4095] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9e4a6e851a [ 88.202448][ T4095] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 88.210405][ T4095] RBP: 00007f9e4985d020 R08: 00007f9e4985d020 R09: 00000000200000c0 [ 88.218363][ T4095] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 88.226324][ T4095] R13: 0000000020000000 R14: 00007f9e4985cfe0 R15: 000000002001b240 [ 88.234442][ T4095] [ 88.237448][ T4089] CPU: 0 PID: 4089 Comm: syz-executor.1 Not tainted 5.16.0-syzkaller #0 12:22:39 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 15) 12:22:39 executing program 4: msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) 12:22:39 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 15) [ 88.245780][ T4089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 88.247514][ T4095] EXT4-fs: error -12 creating inode table initialization thread [ 88.255826][ T4089] Call Trace: [ 88.255835][ T4089] [ 88.255841][ T4089] dump_stack_lvl+0xd6/0x122 [ 88.274423][ T4089] dump_stack+0x11/0x1b [ 88.278585][ T4089] should_fail+0x23c/0x250 [ 88.283027][ T4089] ? __se_sys_mount+0xf7/0x2f0 [ 88.287826][ T4089] __should_failslab+0x81/0x90 [ 88.291842][ T4093] FAULT_INJECTION: forcing a failure. [ 88.291842][ T4093] name failslab, interval 1, probability 0, space 0, times 0 [ 88.292601][ T4089] should_failslab+0x5/0x20 [ 88.309662][ T4089] kmem_cache_alloc_trace+0x52/0x350 [ 88.314957][ T4089] ? memdup_user+0x96/0xb0 [ 88.319462][ T4089] __se_sys_mount+0xf7/0x2f0 [ 88.324045][ T4089] ? do_user_addr_fault+0x7d4/0xb90 [ 88.329245][ T4089] __x64_sys_mount+0x63/0x70 [ 88.333822][ T4089] do_syscall_64+0x44/0xd0 [ 88.338318][ T4089] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 88.344234][ T4089] RIP: 0033:0x7f4792e0951a [ 88.348632][ T4089] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 88.368223][ T4089] RSP: 002b:00007f4791f7df88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 88.376880][ T4089] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4792e0951a [ 88.384924][ T4089] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 88.392879][ T4089] RBP: 00007f4791f7e020 R08: 00007f4791f7e020 R09: 00000000200000c0 12:22:39 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 6) 12:22:39 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:39 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) quotactl(0x8, &(0x7f0000000040)='./file0\x00', 0xee00, &(0x7f0000000200)="28b6e62a8bab31be9ce0c908704f9464d9b339f5e213dd0be0e5f88c4fb1f2eb047437acb2a9c1551e0e2a21a71ca364f2782ec58a67827db1426ece7bb441c46ea70813fd3cba9c605f5049e2712dfb30231e4899f069d9c37cedde07c45057d91a2ad270c691599712f9b6649adcddb52d2d35a9f9a62d9fe997d9ad426cd6e3f535b1b52a19e80b0c40781e497f0919c7e420d3d9df3775ff16df94e3bfc2dd38c051b3cc5ce6e36c394a2458fa2dc534dc9f0fcf6069b1d27e709ad1c257c0a51c1b0324a77cba2f32c4b2080c002d33bb718b324f10f1258dfaa7036562607c79b5f0e7253fd8c6e53694fc2204b414ccb0") setxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000180)='./file0\x00', 0x8, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='+/f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) [ 88.400836][ T4089] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 88.408792][ T4089] R13: 0000000020000000 R14: 00007f4791f7dfe0 R15: 000000002001b240 [ 88.416748][ T4089] [ 88.419752][ T4093] CPU: 1 PID: 4093 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 88.428164][ T4093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 88.438214][ T4093] Call Trace: [ 88.441488][ T4093] [ 88.444414][ T4093] dump_stack_lvl+0xd6/0x122 12:22:39 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) quotactl(0x8, &(0x7f0000000040)='./file0\x00', 0xee00, &(0x7f0000000200)="28b6e62a8bab31be9ce0c908704f9464d9b339f5e213dd0be0e5f88c4fb1f2eb047437acb2a9c1551e0e2a21a71ca364f2782ec58a67827db1426ece7bb441c46ea70813fd3cba9c605f5049e2712dfb30231e4899f069d9c37cedde07c45057d91a2ad270c691599712f9b6649adcddb52d2d35a9f9a62d9fe997d9ad426cd6e3f535b1b52a19e80b0c40781e497f0919c7e420d3d9df3775ff16df94e3bfc2dd38c051b3cc5ce6e36c394a2458fa2dc534dc9f0fcf6069b1d27e709ad1c257c0a51c1b0324a77cba2f32c4b2080c002d33bb718b324f10f1258dfaa7036562607c79b5f0e7253fd8c6e53694fc2204b414ccb0") (async) setxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000180)='./file0\x00', 0x8, 0x1) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='+/f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) 12:22:39 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async, rerun: 64) quotactl(0x8, &(0x7f0000000040)='./file0\x00', 0xee00, &(0x7f0000000200)="28b6e62a8bab31be9ce0c908704f9464d9b339f5e213dd0be0e5f88c4fb1f2eb047437acb2a9c1551e0e2a21a71ca364f2782ec58a67827db1426ece7bb441c46ea70813fd3cba9c605f5049e2712dfb30231e4899f069d9c37cedde07c45057d91a2ad270c691599712f9b6649adcddb52d2d35a9f9a62d9fe997d9ad426cd6e3f535b1b52a19e80b0c40781e497f0919c7e420d3d9df3775ff16df94e3bfc2dd38c051b3cc5ce6e36c394a2458fa2dc534dc9f0fcf6069b1d27e709ad1c257c0a51c1b0324a77cba2f32c4b2080c002d33bb718b324f10f1258dfaa7036562607c79b5f0e7253fd8c6e53694fc2204b414ccb0") (async, rerun: 64) setxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000180)='./file0\x00', 0x8, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='+/f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) [ 88.449026][ T4093] dump_stack+0x11/0x1b [ 88.453282][ T4093] should_fail+0x23c/0x250 [ 88.457784][ T4093] ? security_file_alloc+0x30/0x190 [ 88.463011][ T4093] __should_failslab+0x81/0x90 [ 88.467814][ T4093] should_failslab+0x5/0x20 [ 88.472415][ T4093] kmem_cache_alloc+0x4f/0x320 [ 88.477307][ T4093] security_file_alloc+0x30/0x190 [ 88.482344][ T4093] __alloc_file+0x83/0x1a0 [ 88.486900][ T4093] alloc_empty_file+0xcd/0x1c0 [ 88.491747][ T4093] path_openat+0x6a/0x1f30 [ 88.496355][ T4093] ? __this_cpu_preempt_check+0x18/0x20 [ 88.501901][ T4093] ? debug_smp_processor_id+0x18/0x20 [ 88.507275][ T4093] ? mod_objcg_state+0x490/0x5c0 [ 88.512220][ T4093] ? refill_obj_stock+0x140/0x220 [ 88.517221][ T4093] ? __rcu_read_unlock+0x5c/0x290 [ 88.522225][ T4093] ? __rcu_read_lock+0x32/0x40 [ 88.527006][ T4093] do_filp_open+0x105/0x220 [ 88.531496][ T4093] do_sys_openat2+0xb5/0x2b0 [ 88.536065][ T4093] __x64_sys_openat+0xef/0x110 [ 88.540806][ T4093] do_syscall_64+0x44/0xd0 [ 88.545246][ T4093] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 88.551197][ T4093] RIP: 0033:0x7fa003f98f04 [ 88.555590][ T4093] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 88.575181][ T4093] RSP: 002b:00007fa00315bf10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 88.583921][ T4093] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa003f98f04 [ 88.591872][ T4093] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 88.599824][ T4093] RBP: 0000000020000000 R08: 0000000000000000 R09: 00000000200000c0 [ 88.607798][ T4093] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 88.615752][ T4093] R13: 0000000020000000 R14: 00007fa00315bfe0 R15: 000000002001b240 [ 88.623712][ T4093] [ 88.645294][ T4113] FAULT_INJECTION: forcing a failure. [ 88.645294][ T4113] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 88.658468][ T4113] CPU: 1 PID: 4113 Comm: syz-executor.1 Not tainted 5.16.0-syzkaller #0 [ 88.666803][ T4113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 88.672513][ T4115] FAULT_INJECTION: forcing a failure. [ 88.672513][ T4115] name failslab, interval 1, probability 0, space 0, times 0 [ 88.676854][ T4113] Call Trace: [ 88.676864][ T4113] [ 88.676871][ T4113] dump_stack_lvl+0xd6/0x122 [ 88.676897][ T4113] dump_stack+0x11/0x1b [ 88.676916][ T4113] should_fail+0x23c/0x250 [ 88.708752][ T4113] should_fail_usercopy+0x16/0x20 [ 88.713772][ T4113] _copy_from_user+0x1c/0xd0 [ 88.718354][ T4113] __se_sys_mount+0x119/0x2f0 [ 88.723019][ T4113] ? do_user_addr_fault+0x7d4/0xb90 [ 88.728207][ T4113] __x64_sys_mount+0x63/0x70 [ 88.732781][ T4113] do_syscall_64+0x44/0xd0 [ 88.737197][ T4113] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 88.743084][ T4113] RIP: 0033:0x7f4792e0951a [ 88.747483][ T4113] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 88.767075][ T4113] RSP: 002b:00007f4791f7df88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 88.775473][ T4113] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4792e0951a [ 88.783518][ T4113] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 88.791559][ T4113] RBP: 00007f4791f7e020 R08: 00007f4791f7e020 R09: 00000000200000c0 [ 88.799514][ T4113] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 88.807469][ T4113] R13: 0000000020000000 R14: 00007f4791f7dfe0 R15: 000000002001b240 [ 88.815428][ T4113] [ 88.818439][ T4115] CPU: 0 PID: 4115 Comm: syz-executor.5 Not tainted 5.16.0-syzkaller #0 [ 88.824513][ T4111] FAULT_INJECTION: forcing a failure. [ 88.824513][ T4111] name failslab, interval 1, probability 0, space 0, times 0 [ 88.826791][ T4115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 88.826803][ T4115] Call Trace: [ 88.826809][ T4115] [ 88.826815][ T4115] dump_stack_lvl+0xd6/0x122 [ 88.860457][ T4115] dump_stack+0x11/0x1b [ 88.864684][ T4115] should_fail+0x23c/0x250 [ 88.869174][ T4115] ? security_file_alloc+0x30/0x190 [ 88.874374][ T4115] __should_failslab+0x81/0x90 [ 88.879206][ T4115] should_failslab+0x5/0x20 [ 88.883735][ T4115] kmem_cache_alloc+0x4f/0x320 [ 88.888489][ T4115] security_file_alloc+0x30/0x190 [ 88.893740][ T4115] __alloc_file+0x83/0x1a0 [ 88.898555][ T4115] alloc_empty_file+0xcd/0x1c0 [ 88.903313][ T4115] path_openat+0x6a/0x1f30 [ 88.907719][ T4115] ? ___ratelimit+0x25d/0x2b0 [ 88.912413][ T4115] ? debug_smp_processor_id+0x18/0x20 [ 88.917843][ T4115] ? mod_objcg_state+0x490/0x5c0 [ 88.923025][ T4115] ? refill_obj_stock+0x140/0x220 [ 88.928045][ T4115] ? __rcu_read_unlock+0x5c/0x290 [ 88.933054][ T4115] ? __rcu_read_lock+0x32/0x40 [ 88.937885][ T4115] do_filp_open+0x105/0x220 [ 88.942377][ T4115] do_sys_openat2+0xb5/0x2b0 [ 88.946980][ T4115] __x64_sys_openat+0xef/0x110 [ 88.951814][ T4115] do_syscall_64+0x44/0xd0 [ 88.956293][ T4115] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 88.962200][ T4115] RIP: 0033:0x7f9e4a699f04 [ 88.966602][ T4115] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 88.986194][ T4115] RSP: 002b:00007f9e4985cf10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 12:22:39 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 16) 12:22:39 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x35) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./b'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KDFONTOP_SET(r0, 0x7040, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) [ 88.994591][ T4115] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9e4a699f04 [ 89.002557][ T4115] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 89.010512][ T4115] RBP: 0000000020000000 R08: 0000000000000000 R09: 00000000200000c0 [ 89.018476][ T4115] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 89.026502][ T4115] R13: 0000000020000000 R14: 00007f9e4985cfe0 R15: 000000002001b240 [ 89.034723][ T4115] [ 89.037767][ T4111] CPU: 1 PID: 4111 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller #0 12:22:39 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 16) 12:22:39 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x35) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./b'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async, rerun: 64) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (rerun: 64) ioctl$KDFONTOP_SET(r0, 0x7040, 0x0) (async) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) [ 89.046791][ T4111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 89.056850][ T4111] Call Trace: [ 89.060131][ T4111] [ 89.063074][ T4111] dump_stack_lvl+0xd6/0x122 [ 89.067716][ T4111] dump_stack+0x11/0x1b [ 89.071877][ T4111] should_fail+0x23c/0x250 [ 89.076374][ T4111] ? security_file_alloc+0x30/0x190 [ 89.081686][ T4111] __should_failslab+0x81/0x90 [ 89.086524][ T4111] should_failslab+0x5/0x20 [ 89.091064][ T4111] kmem_cache_alloc+0x4f/0x320 [ 89.095825][ T4111] security_file_alloc+0x30/0x190 [ 89.100862][ T4111] __alloc_file+0x83/0x1a0 [ 89.105355][ T4111] alloc_empty_file+0xcd/0x1c0 [ 89.110203][ T4111] path_openat+0x6a/0x1f30 [ 89.114606][ T4111] ? ___ratelimit+0x25d/0x2b0 [ 89.119277][ T4111] ? debug_smp_processor_id+0x18/0x20 [ 89.124715][ T4111] ? mod_objcg_state+0x490/0x5c0 [ 89.129726][ T4111] ? refill_obj_stock+0x140/0x220 [ 89.134764][ T4111] ? __rcu_read_unlock+0x5c/0x290 [ 89.139779][ T4111] ? __rcu_read_lock+0x32/0x40 [ 89.144565][ T4111] do_filp_open+0x105/0x220 [ 89.149061][ T4111] do_sys_openat2+0xb5/0x2b0 [ 89.153636][ T4111] __x64_sys_openat+0xef/0x110 [ 89.158392][ T4111] do_syscall_64+0x44/0xd0 [ 89.162823][ T4111] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 89.168830][ T4111] RIP: 0033:0x7f70508f8f04 [ 89.173255][ T4111] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 89.192844][ T4111] RSP: 002b:00007f704fabbf10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 89.201242][ T4111] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f70508f8f04 [ 89.209203][ T4111] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 89.217157][ T4111] RBP: 0000000020000000 R08: 0000000000000000 R09: 00000000200000c0 [ 89.225300][ T4111] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 89.233266][ T4111] R13: 0000000020000000 R14: 00007f704fabbfe0 R15: 000000002001b240 [ 89.241337][ T4111] 12:22:40 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 16) 12:22:40 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 7) 12:22:40 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:40 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x35) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./b'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KDFONTOP_SET(r0, 0x7040, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x35) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./b'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$KDFONTOP_SET(r0, 0x7040, 0x0) (async) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) (async) [ 89.259228][ T4127] FAULT_INJECTION: forcing a failure. [ 89.259228][ T4127] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 89.272334][ T4127] CPU: 1 PID: 4127 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 89.280668][ T4127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 89.290724][ T4127] Call Trace: [ 89.294107][ T4127] [ 89.297040][ T4127] dump_stack_lvl+0xd6/0x122 [ 89.301636][ T4127] dump_stack+0x11/0x1b [ 89.305797][ T4127] should_fail+0x23c/0x250 [ 89.310220][ T4127] should_fail_usercopy+0x16/0x20 [ 89.315316][ T4127] _copy_to_user+0x1c/0x90 [ 89.319738][ T4127] simple_read_from_buffer+0xab/0x120 [ 89.319991][ T4130] FAULT_INJECTION: forcing a failure. [ 89.319991][ T4130] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 89.325124][ T4127] proc_fail_nth_read+0x10d/0x150 [ 89.343313][ T4127] ? proc_fault_inject_write+0x230/0x230 [ 89.349016][ T4127] vfs_read+0x1e6/0x750 [ 89.353248][ T4127] ? __fget_files+0x1d2/0x210 [ 89.357974][ T4127] ksys_read+0xd9/0x190 [ 89.362117][ T4127] __x64_sys_read+0x3e/0x50 [ 89.366611][ T4127] do_syscall_64+0x44/0xd0 [ 89.371027][ T4127] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 89.376994][ T4127] RIP: 0033:0x7fa003f98b9c [ 89.381414][ T4127] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 89.401007][ T4127] RSP: 002b:00007fa00315c160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 89.409406][ T4127] RAX: ffffffffffffffda RBX: 00007fa0040f8f60 RCX: 00007fa003f98b9c [ 89.417364][ T4127] RDX: 000000000000000f RSI: 00007fa00315c1e0 RDI: 0000000000000003 [ 89.425319][ T4127] RBP: 00007fa00315c1d0 R08: 0000000000000000 R09: 00000000200000c0 [ 89.433279][ T4127] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 89.441297][ T4127] R13: 00007ffcd401503f R14: 00007fa00315c300 R15: 0000000000022000 [ 89.449258][ T4127] [ 89.452281][ T4130] CPU: 0 PID: 4130 Comm: syz-executor.5 Not tainted 5.16.0-syzkaller #0 [ 89.460771][ T4130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 89.467570][ T4138] FAULT_INJECTION: forcing a failure. [ 89.467570][ T4138] name failslab, interval 1, probability 0, space 0, times 0 [ 89.470824][ T4130] Call Trace: [ 89.470833][ T4130] [ 89.470840][ T4130] dump_stack_lvl+0xd6/0x122 [ 89.494159][ T4130] dump_stack+0x11/0x1b [ 89.498409][ T4130] should_fail+0x23c/0x250 [ 89.502977][ T4130] should_fail_usercopy+0x16/0x20 [ 89.508009][ T4130] _copy_to_user+0x1c/0x90 [ 89.512412][ T4130] simple_read_from_buffer+0xab/0x120 [ 89.517791][ T4130] proc_fail_nth_read+0x10d/0x150 [ 89.522950][ T4130] ? proc_fault_inject_write+0x230/0x230 [ 89.528572][ T4130] vfs_read+0x1e6/0x750 [ 89.532719][ T4130] ? __fget_files+0x1d2/0x210 [ 89.537441][ T4130] ksys_read+0xd9/0x190 [ 89.541618][ T4130] __x64_sys_read+0x3e/0x50 [ 89.546105][ T4130] do_syscall_64+0x44/0xd0 [ 89.550514][ T4130] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 89.556413][ T4130] RIP: 0033:0x7f9e4a699b9c [ 89.560817][ T4130] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 89.580783][ T4130] RSP: 002b:00007f9e4985d160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 89.589184][ T4130] RAX: ffffffffffffffda RBX: 00007f9e4a7f9f60 RCX: 00007f9e4a699b9c [ 89.597167][ T4130] RDX: 000000000000000f RSI: 00007f9e4985d1e0 RDI: 0000000000000003 [ 89.605120][ T4130] RBP: 00007f9e4985d1d0 R08: 0000000000000000 R09: 00000000200000c0 [ 89.613142][ T4130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 89.621102][ T4130] R13: 00007ffd8cb5ef9f R14: 00007f9e4985d300 R15: 0000000000022000 [ 89.629058][ T4130] [ 89.632060][ T4138] CPU: 1 PID: 4138 Comm: syz-executor.1 Not tainted 5.16.0-syzkaller #0 [ 89.640388][ T4138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 89.650444][ T4138] Call Trace: [ 89.653726][ T4138] [ 89.656664][ T4138] dump_stack_lvl+0xd6/0x122 12:22:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890c, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @private=0xa010102}, @generic={0x0, "c9f82881cf2383c34673609a3c75"}, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}, 0xf0f4, 0x0, 0x0, 0x0, 0xfffc, &(0x7f0000000240)='syz_tun\x00'}) listen(r0, 0xa0000000) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) 12:22:40 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:40 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890c, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @private=0xa010102}, @generic={0x0, "c9f82881cf2383c34673609a3c75"}, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}, 0xf0f4, 0x0, 0x0, 0x0, 0xfffc, &(0x7f0000000240)='syz_tun\x00'}) (async) listen(r0, 0xa0000000) (async) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async, rerun: 32) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (rerun: 32) [ 89.661304][ T4138] dump_stack+0x11/0x1b [ 89.665473][ T4138] should_fail+0x23c/0x250 [ 89.669915][ T4138] ? getname_flags+0x84/0x3f0 [ 89.674610][ T4138] __should_failslab+0x81/0x90 [ 89.679378][ T4138] should_failslab+0x5/0x20 [ 89.683977][ T4138] kmem_cache_alloc+0x4f/0x320 [ 89.688868][ T4138] getname_flags+0x84/0x3f0 [ 89.688905][ T4143] FAULT_INJECTION: forcing a failure. [ 89.688905][ T4143] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 89.693720][ T4138] ? should_fail+0xd6/0x250 [ 89.711222][ T4138] user_path_at_empty+0x28/0x110 [ 89.716156][ T4138] __se_sys_mount+0x217/0x2f0 [ 89.720823][ T4138] ? do_user_addr_fault+0x7d4/0xb90 [ 89.726010][ T4138] __x64_sys_mount+0x63/0x70 [ 89.730586][ T4138] do_syscall_64+0x44/0xd0 [ 89.734998][ T4138] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 89.740886][ T4138] RIP: 0033:0x7f4792e0951a [ 89.745300][ T4138] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 89.764981][ T4138] RSP: 002b:00007f4791f7df88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 89.773380][ T4138] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4792e0951a [ 89.781335][ T4138] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 89.789317][ T4138] RBP: 00007f4791f7e020 R08: 00007f4791f7e020 R09: 00000000200000c0 [ 89.797272][ T4138] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 12:22:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890c, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @private=0xa010102}, @generic={0x0, "c9f82881cf2383c34673609a3c75"}, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}, 0xf0f4, 0x0, 0x0, 0x0, 0xfffc, &(0x7f0000000240)='syz_tun\x00'}) listen(r0, 0xa0000000) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) (async) ioctl$sock_SIOCADDRT(r0, 0x890c, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @private=0xa010102}, @generic={0x0, "c9f82881cf2383c34673609a3c75"}, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}, 0xf0f4, 0x0, 0x0, 0x0, 0xfffc, &(0x7f0000000240)='syz_tun\x00'}) (async) listen(r0, 0xa0000000) (async) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async) 12:22:40 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 8) [ 89.805237][ T4138] R13: 0000000020000000 R14: 00007f4791f7dfe0 R15: 000000002001b240 [ 89.813194][ T4138] [ 89.816205][ T4143] CPU: 0 PID: 4143 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller #0 [ 89.824601][ T4143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 89.834652][ T4143] Call Trace: [ 89.837982][ T4143] [ 89.840915][ T4143] dump_stack_lvl+0xd6/0x122 [ 89.845522][ T4143] dump_stack+0x11/0x1b [ 89.849687][ T4143] should_fail+0x23c/0x250 [ 89.854235][ T4143] should_fail_usercopy+0x16/0x20 12:22:40 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) open$dir(&(0x7f0000000040)='./file0\x00', 0x189982, 0x171) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) 12:22:40 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) open$dir(&(0x7f0000000040)='./file0\x00', 0x189982, 0x171) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) open$dir(&(0x7f0000000040)='./file0\x00', 0x189982, 0x171) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async) [ 89.859276][ T4143] _copy_to_user+0x1c/0x90 [ 89.863699][ T4143] simple_read_from_buffer+0xab/0x120 [ 89.869186][ T4143] proc_fail_nth_read+0x10d/0x150 [ 89.874278][ T4143] ? proc_fault_inject_write+0x230/0x230 [ 89.880003][ T4143] vfs_read+0x1e6/0x750 [ 89.884179][ T4143] ? __fget_files+0x1d2/0x210 [ 89.888910][ T4143] ksys_read+0xd9/0x190 [ 89.893067][ T4143] __x64_sys_read+0x3e/0x50 [ 89.897572][ T4143] do_syscall_64+0x44/0xd0 [ 89.901999][ T4143] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 89.908031][ T4143] RIP: 0033:0x7f70508f8b9c [ 89.912453][ T4143] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 89.932048][ T4143] RSP: 002b:00007f704fabc160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 89.940535][ T4143] RAX: ffffffffffffffda RBX: 00007f7050a58f60 RCX: 00007f70508f8b9c [ 89.948491][ T4143] RDX: 000000000000000f RSI: 00007f704fabc1e0 RDI: 0000000000000003 12:22:40 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:40 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) open$dir(&(0x7f0000000040)='./file0\x00', 0x189982, 0x171) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) [ 89.956563][ T4143] RBP: 00007f704fabc1d0 R08: 0000000000000000 R09: 00000000200000c0 [ 89.964528][ T4143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 89.972506][ T4143] R13: 00007fffd4112d9f R14: 00007f704fabc300 R15: 0000000000022000 [ 89.980465][ T4143] [ 90.015954][ T4168] FAULT_INJECTION: forcing a failure. [ 90.015954][ T4168] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 90.029051][ T4168] CPU: 1 PID: 4168 Comm: syz-executor.1 Not tainted 5.16.0-syzkaller #0 [ 90.037380][ T4168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 90.047439][ T4168] Call Trace: [ 90.050727][ T4168] [ 90.053659][ T4168] dump_stack_lvl+0xd6/0x122 [ 90.058278][ T4168] dump_stack+0x11/0x1b 12:22:40 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x11, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c92", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:40 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:40 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:40 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 12:22:40 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:40 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async, rerun: 32) rmdir(&(0x7f0000000040)='./file0\x00') (rerun: 32) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 12:22:40 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async, rerun: 32) rmdir(&(0x7f0000000040)='./file0\x00') (async, rerun: 32) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 90.062446][ T4168] should_fail+0x23c/0x250 [ 90.066872][ T4168] should_fail_usercopy+0x16/0x20 [ 90.071915][ T4168] strncpy_from_user+0x21/0x250 [ 90.076773][ T4168] getname_flags+0xb8/0x3f0 [ 90.081286][ T4168] ? should_fail+0xd6/0x250 [ 90.085794][ T4168] user_path_at_empty+0x28/0x110 [ 90.090743][ T4168] __se_sys_mount+0x217/0x2f0 [ 90.095431][ T4168] ? do_user_addr_fault+0x7d4/0xb90 [ 90.100639][ T4168] __x64_sys_mount+0x63/0x70 [ 90.105241][ T4168] do_syscall_64+0x44/0xd0 [ 90.109673][ T4168] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 90.115754][ T4168] RIP: 0033:0x7f4792e0951a [ 90.120166][ T4168] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 90.139794][ T4168] RSP: 002b:00007f4791f7df88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 90.148216][ T4168] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4792e0951a [ 90.156192][ T4168] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 90.164156][ T4168] RBP: 00007f4791f7e020 R08: 00007f4791f7e020 R09: 00000000200000c0 [ 90.172138][ T4168] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 90.180187][ T4168] R13: 0000000020000000 R14: 00007f4791f7dfe0 R15: 000000002001b240 [ 90.188152][ T4168] 12:22:41 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 9) 12:22:41 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f0000000500)='./file0\x00', 0x5, 0x3, &(0x7f00000016c0)=[{&(0x7f0000000540)="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", 0x1000, 0x3f}, {&(0x7f0000001540)="ef6cde8d72d0abe4289d8bdd2edf30d8f1eb6fc31b7dedc4e54404f77444116080d067f21a6c9586046a9ca75630773c95a0284129bb2149b33a7c7b8640f7e131646af7a4d6a048cf1229ceb567f7a32d56ef15f66a348b83b477f70c2b81c45c6386e34ff1ce791f628891ba2d19d1be2e296b51bfdb6c6e14a3e957fbeaf4c7d3d0a10ff7aa1048d773224f5fc6b9472dc9f31c76cf1abe7433399bbf3986e201", 0xa2, 0xdacb}, {&(0x7f0000001600)="3d2570b2e4e30a4c0bd590b1391135971928c8980017bcca337b401227ffcefe1d412df81c04335c80855d58980579267874c5c448f8fb20c4458871627cd70f9ab15ea15771a6a786cefef0d62aa081b0c1bb5c5ca0f788249f57f7f17160fe6c62c5f809fe4f1947b5a07f2e024ef9122116696fb11112423a9b7c2286852f2867476cf73bd3d46e230a546e690ef43838a3d39618014ef4c9d28366d7e7ec1ce2c0096cea9c91", 0xa8, 0x7}], 0xa02004, &(0x7f0000001740)={[{@block={'block', 0x3d, 0xc00}}, {@iocharset={'iocharset', 0x3d, 'macturkish'}}], [{@subj_type={'subj_type', 0x3d, '\x00'}}, {@subj_role={'subj_role', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, ':([-'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@fowner_lt={'fowner<', 0xee01}}, {@hash}, {@smackfshat={'smackfshat', 0x3d, '\x00'}}, {@obj_role={'obj_role', 0x3d, '['}}, {@smackfsfloor}]}) openat2(r0, &(0x7f0000001800)='./file0\x00', &(0x7f0000001840)={0x420000, 0x110, 0x58d45f9bd7715ae7}, 0x18) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=@newqdisc={0x2d0, 0x24, 0x300, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x3, 0xfff3}, {0xfff3, 0xfff1}, {0x7, 0x4}}, [@TCA_STAB={0x34, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x2, 0x20, 0x6, 0x100, 0x1, 0x8, 0x3, 0x7}}, {0x12, 0x2, [0xb8, 0x66b, 0x7, 0x0, 0x6, 0x4, 0xff]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x8001}, @TCA_STAB={0x5c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x7f, 0x7, 0x2, 0x7, 0x3, 0x3, 0xffffff1f, 0x8}}, {0x14, 0x2, [0xcfa, 0x7ff, 0x29f4, 0x5, 0x9, 0x36, 0x3, 0x9]}}, {{0x1c, 0x1, {0x5, 0x1, 0x101, 0x3, 0x2, 0xe2, 0x400, 0x4}}, {0xc, 0x2, [0x8, 0x2, 0x8, 0x2]}}]}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x7}, @qdisc_kind_options=@q_pfifo={{0xa}, {0x8, 0x2, 0x7}}, @TCA_STAB={0x114, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x4, 0x1, 0x6, 0x6, 0x0, 0x1, 0xb9, 0x1}}, {0x6, 0x2, [0x2]}}, {{0x1c, 0x1, {0xe0, 0x7, 0x1000, 0x3f, 0x0, 0x8, 0x5, 0x1}}, {0x6, 0x2, [0x6]}}, {{0x1c, 0x1, {0x40, 0x80, 0x40, 0x7, 0x0, 0xfff, 0xce8, 0x7}}, {0x12, 0x2, [0x4, 0x7, 0x3f, 0x7c, 0x20, 0x7f9f, 0x5]}}, {{0x1c, 0x1, {0x7f, 0xff, 0x2, 0x9, 0x1, 0x1ff, 0xff, 0x1}}, {0x6, 0x2, [0x2]}}, {{0x1c, 0x1, {0x2, 0x86, 0x362, 0x5, 0x2, 0x18, 0x5, 0x2}}, {0x8, 0x2, [0x5, 0x3f2f]}}, {{0x1c, 0x1, {0x3, 0x4, 0x5a, 0x9, 0x0, 0x2d, 0x6, 0x6}}, {0x10, 0x2, [0x8000, 0x8, 0x5, 0x6, 0x5, 0x6]}}, {{0x1c, 0x1, {0x6, 0x9, 0x2000, 0x5, 0x0, 0x0, 0x4, 0x2}}, {0x8, 0x2, [0x3, 0x9]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x1}, @TCA_RATE={0x6, 0x5, {0x1, 0x80}}, @qdisc_kind_options=@q_cbq={{0x8}, {0xc4, 0x2, [@TCA_CBS_PARMS={0x18, 0x1, {0x8, '\x00', 0x3f, 0x10000, 0x0, 0x5}}, @TCA_CBS_PARMS={0x18, 0x1, {0x97, '\x00', 0xfffffffa, 0x200, 0x10000, 0xc747}}, @TCA_CBS_PARMS={0x18, 0x1, {0x6, '\x00', 0x2, 0x195, 0xf68a, 0x7}}, @TCA_CBS_PARMS={0x18, 0x1, {0xff, '\x00', 0x6, 0x2, 0x5, 0x5}}, @TCA_CBS_PARMS={0x18, 0x1, {0xe4, '\x00', 0xffffffc1, 0x9, 0xe35c, 0x8577015}}, @TCA_CBS_PARMS={0x18, 0x1, {0x20, '\x00', 0x609, 0x7, 0x9, 0x8}}, @TCA_CBS_PARMS={0x18, 0x1, {0x6, '\x00', 0x10000, 0x10001, 0x2, 0x81}}, @TCA_CBS_PARMS={0x18, 0x1, {0x0, '\x00', 0xfff, 0x9, 0xe70000, 0x1}}]}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x1}]}, 0x2d0}, 0x1, 0x0, 0x0, 0x4040000}, 0x4040844) 12:22:41 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x11, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c92", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:41 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:41 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:41 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:41 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:41 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) [ 90.241825][ T4196] loop4: detected capacity change from 0 to 218 [ 90.261112][ T4198] FAULT_INJECTION: forcing a failure. [ 90.261112][ T4198] name failslab, interval 1, probability 0, space 0, times 0 [ 90.273909][ T4198] CPU: 1 PID: 4198 Comm: syz-executor.1 Not tainted 5.16.0-syzkaller #0 12:22:41 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) [ 90.282322][ T4198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 90.292379][ T4198] Call Trace: [ 90.295659][ T4198] [ 90.298598][ T4198] dump_stack_lvl+0xd6/0x122 [ 90.303177][ T4198] dump_stack+0x11/0x1b [ 90.307357][ T4198] should_fail+0x23c/0x250 [ 90.312067][ T4198] ? alloc_fs_context+0x46/0x500 [ 90.317007][ T4198] __should_failslab+0x81/0x90 [ 90.321778][ T4198] should_failslab+0x5/0x20 [ 90.326423][ T4198] kmem_cache_alloc_trace+0x52/0x350 [ 90.331735][ T4198] alloc_fs_context+0x46/0x500 [ 90.336488][ T4198] ? security_capable+0x91/0xa0 [ 90.341355][ T4198] fs_context_for_reconfigure+0x42/0x50 [ 90.346885][ T4198] path_mount+0x120d/0x1c40 [ 90.351373][ T4198] __se_sys_mount+0x24b/0x2f0 [ 90.356104][ T4198] ? do_user_addr_fault+0x7d4/0xb90 [ 90.361363][ T4198] __x64_sys_mount+0x63/0x70 [ 90.365965][ T4198] do_syscall_64+0x44/0xd0 [ 90.370461][ T4198] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 90.376361][ T4198] RIP: 0033:0x7f4792e0951a [ 90.381030][ T4198] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 90.400820][ T4198] RSP: 002b:00007f4791f7df88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 90.409255][ T4198] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4792e0951a [ 90.417332][ T4198] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 90.425360][ T4198] RBP: 00007f4791f7e020 R08: 00007f4791f7e020 R09: 00000000200000c0 [ 90.433368][ T4198] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 12:22:41 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 10) 12:22:41 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async) r0 = syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f0000000500)='./file0\x00', 0x5, 0x3, &(0x7f00000016c0)=[{&(0x7f0000000540)="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", 0x1000, 0x3f}, {&(0x7f0000001540)="ef6cde8d72d0abe4289d8bdd2edf30d8f1eb6fc31b7dedc4e54404f77444116080d067f21a6c9586046a9ca75630773c95a0284129bb2149b33a7c7b8640f7e131646af7a4d6a048cf1229ceb567f7a32d56ef15f66a348b83b477f70c2b81c45c6386e34ff1ce791f628891ba2d19d1be2e296b51bfdb6c6e14a3e957fbeaf4c7d3d0a10ff7aa1048d773224f5fc6b9472dc9f31c76cf1abe7433399bbf3986e201", 0xa2, 0xdacb}, {&(0x7f0000001600)="3d2570b2e4e30a4c0bd590b1391135971928c8980017bcca337b401227ffcefe1d412df81c04335c80855d58980579267874c5c448f8fb20c4458871627cd70f9ab15ea15771a6a786cefef0d62aa081b0c1bb5c5ca0f788249f57f7f17160fe6c62c5f809fe4f1947b5a07f2e024ef9122116696fb11112423a9b7c2286852f2867476cf73bd3d46e230a546e690ef43838a3d39618014ef4c9d28366d7e7ec1ce2c0096cea9c91", 0xa8, 0x7}], 0xa02004, &(0x7f0000001740)={[{@block={'block', 0x3d, 0xc00}}, {@iocharset={'iocharset', 0x3d, 'macturkish'}}], [{@subj_type={'subj_type', 0x3d, '\x00'}}, {@subj_role={'subj_role', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, ':([-'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@fowner_lt={'fowner<', 0xee01}}, {@hash}, {@smackfshat={'smackfshat', 0x3d, '\x00'}}, {@obj_role={'obj_role', 0x3d, '['}}, {@smackfsfloor}]}) openat2(r0, &(0x7f0000001800)='./file0\x00', &(0x7f0000001840)={0x420000, 0x110, 0x58d45f9bd7715ae7}, 0x18) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=@newqdisc={0x2d0, 0x24, 0x300, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x3, 0xfff3}, {0xfff3, 0xfff1}, {0x7, 0x4}}, [@TCA_STAB={0x34, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x2, 0x20, 0x6, 0x100, 0x1, 0x8, 0x3, 0x7}}, {0x12, 0x2, [0xb8, 0x66b, 0x7, 0x0, 0x6, 0x4, 0xff]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x8001}, @TCA_STAB={0x5c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x7f, 0x7, 0x2, 0x7, 0x3, 0x3, 0xffffff1f, 0x8}}, {0x14, 0x2, [0xcfa, 0x7ff, 0x29f4, 0x5, 0x9, 0x36, 0x3, 0x9]}}, {{0x1c, 0x1, {0x5, 0x1, 0x101, 0x3, 0x2, 0xe2, 0x400, 0x4}}, {0xc, 0x2, [0x8, 0x2, 0x8, 0x2]}}]}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x7}, @qdisc_kind_options=@q_pfifo={{0xa}, {0x8, 0x2, 0x7}}, @TCA_STAB={0x114, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x4, 0x1, 0x6, 0x6, 0x0, 0x1, 0xb9, 0x1}}, {0x6, 0x2, [0x2]}}, {{0x1c, 0x1, {0xe0, 0x7, 0x1000, 0x3f, 0x0, 0x8, 0x5, 0x1}}, {0x6, 0x2, [0x6]}}, {{0x1c, 0x1, {0x40, 0x80, 0x40, 0x7, 0x0, 0xfff, 0xce8, 0x7}}, {0x12, 0x2, [0x4, 0x7, 0x3f, 0x7c, 0x20, 0x7f9f, 0x5]}}, {{0x1c, 0x1, {0x7f, 0xff, 0x2, 0x9, 0x1, 0x1ff, 0xff, 0x1}}, {0x6, 0x2, [0x2]}}, {{0x1c, 0x1, {0x2, 0x86, 0x362, 0x5, 0x2, 0x18, 0x5, 0x2}}, {0x8, 0x2, [0x5, 0x3f2f]}}, {{0x1c, 0x1, {0x3, 0x4, 0x5a, 0x9, 0x0, 0x2d, 0x6, 0x6}}, {0x10, 0x2, [0x8000, 0x8, 0x5, 0x6, 0x5, 0x6]}}, {{0x1c, 0x1, {0x6, 0x9, 0x2000, 0x5, 0x0, 0x0, 0x4, 0x2}}, {0x8, 0x2, [0x3, 0x9]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x1}, @TCA_RATE={0x6, 0x5, {0x1, 0x80}}, @qdisc_kind_options=@q_cbq={{0x8}, {0xc4, 0x2, [@TCA_CBS_PARMS={0x18, 0x1, {0x8, '\x00', 0x3f, 0x10000, 0x0, 0x5}}, @TCA_CBS_PARMS={0x18, 0x1, {0x97, '\x00', 0xfffffffa, 0x200, 0x10000, 0xc747}}, @TCA_CBS_PARMS={0x18, 0x1, {0x6, '\x00', 0x2, 0x195, 0xf68a, 0x7}}, @TCA_CBS_PARMS={0x18, 0x1, {0xff, '\x00', 0x6, 0x2, 0x5, 0x5}}, @TCA_CBS_PARMS={0x18, 0x1, {0xe4, '\x00', 0xffffffc1, 0x9, 0xe35c, 0x8577015}}, @TCA_CBS_PARMS={0x18, 0x1, {0x20, '\x00', 0x609, 0x7, 0x9, 0x8}}, @TCA_CBS_PARMS={0x18, 0x1, {0x6, '\x00', 0x10000, 0x10001, 0x2, 0x81}}, @TCA_CBS_PARMS={0x18, 0x1, {0x0, '\x00', 0xfff, 0x9, 0xe70000, 0x1}}]}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x1}]}, 0x2d0}, 0x1, 0x0, 0x0, 0x4040000}, 0x4040844) [ 90.441404][ T4198] R13: 0000000020000000 R14: 00007f4791f7dfe0 R15: 000000002001b240 [ 90.449366][ T4198] [ 90.468692][ T2205] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 90.471342][ T4209] EXT4-fs: 25 callbacks suppressed [ 90.471355][ T4209] EXT4-fs (sda1): re-mounted. Quota mode: none. 12:22:41 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) [ 90.496717][ T4215] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 90.504856][ T4219] loop4: detected capacity change from 0 to 218 [ 90.508271][ T4212] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 90.517858][ T4220] FAULT_INJECTION: forcing a failure. [ 90.517858][ T4220] name failslab, interval 1, probability 0, space 0, times 0 [ 90.530565][ T4220] CPU: 1 PID: 4220 Comm: syz-executor.1 Not tainted 5.16.0-syzkaller #0 12:22:41 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:41 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f0000000500)='./file0\x00', 0x5, 0x3, &(0x7f00000016c0)=[{&(0x7f0000000540)="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", 0x1000, 0x3f}, {&(0x7f0000001540)="ef6cde8d72d0abe4289d8bdd2edf30d8f1eb6fc31b7dedc4e54404f77444116080d067f21a6c9586046a9ca75630773c95a0284129bb2149b33a7c7b8640f7e131646af7a4d6a048cf1229ceb567f7a32d56ef15f66a348b83b477f70c2b81c45c6386e34ff1ce791f628891ba2d19d1be2e296b51bfdb6c6e14a3e957fbeaf4c7d3d0a10ff7aa1048d773224f5fc6b9472dc9f31c76cf1abe7433399bbf3986e201", 0xa2, 0xdacb}, {&(0x7f0000001600)="3d2570b2e4e30a4c0bd590b1391135971928c8980017bcca337b401227ffcefe1d412df81c04335c80855d58980579267874c5c448f8fb20c4458871627cd70f9ab15ea15771a6a786cefef0d62aa081b0c1bb5c5ca0f788249f57f7f17160fe6c62c5f809fe4f1947b5a07f2e024ef9122116696fb11112423a9b7c2286852f2867476cf73bd3d46e230a546e690ef43838a3d39618014ef4c9d28366d7e7ec1ce2c0096cea9c91", 0xa8, 0x7}], 0xa02004, &(0x7f0000001740)={[{@block={'block', 0x3d, 0xc00}}, {@iocharset={'iocharset', 0x3d, 'macturkish'}}], [{@subj_type={'subj_type', 0x3d, '\x00'}}, {@subj_role={'subj_role', 0x3d, '\x00'}}, {@fsname={'fsname', 0x3d, ':([-'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@fowner_lt={'fowner<', 0xee01}}, {@hash}, {@smackfshat={'smackfshat', 0x3d, '\x00'}}, {@obj_role={'obj_role', 0x3d, '['}}, {@smackfsfloor}]}) openat2(r0, &(0x7f0000001800)='./file0\x00', &(0x7f0000001840)={0x420000, 0x110, 0x58d45f9bd7715ae7}, 0x18) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=@newqdisc={0x2d0, 0x24, 0x300, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x3, 0xfff3}, {0xfff3, 0xfff1}, {0x7, 0x4}}, [@TCA_STAB={0x34, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x2, 0x20, 0x6, 0x100, 0x1, 0x8, 0x3, 0x7}}, {0x12, 0x2, [0xb8, 0x66b, 0x7, 0x0, 0x6, 0x4, 0xff]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x8001}, @TCA_STAB={0x5c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x7f, 0x7, 0x2, 0x7, 0x3, 0x3, 0xffffff1f, 0x8}}, {0x14, 0x2, [0xcfa, 0x7ff, 0x29f4, 0x5, 0x9, 0x36, 0x3, 0x9]}}, {{0x1c, 0x1, {0x5, 0x1, 0x101, 0x3, 0x2, 0xe2, 0x400, 0x4}}, {0xc, 0x2, [0x8, 0x2, 0x8, 0x2]}}]}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x7}, @qdisc_kind_options=@q_pfifo={{0xa}, {0x8, 0x2, 0x7}}, @TCA_STAB={0x114, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x4, 0x1, 0x6, 0x6, 0x0, 0x1, 0xb9, 0x1}}, {0x6, 0x2, [0x2]}}, {{0x1c, 0x1, {0xe0, 0x7, 0x1000, 0x3f, 0x0, 0x8, 0x5, 0x1}}, {0x6, 0x2, [0x6]}}, {{0x1c, 0x1, {0x40, 0x80, 0x40, 0x7, 0x0, 0xfff, 0xce8, 0x7}}, {0x12, 0x2, [0x4, 0x7, 0x3f, 0x7c, 0x20, 0x7f9f, 0x5]}}, {{0x1c, 0x1, {0x7f, 0xff, 0x2, 0x9, 0x1, 0x1ff, 0xff, 0x1}}, {0x6, 0x2, [0x2]}}, {{0x1c, 0x1, {0x2, 0x86, 0x362, 0x5, 0x2, 0x18, 0x5, 0x2}}, {0x8, 0x2, [0x5, 0x3f2f]}}, {{0x1c, 0x1, {0x3, 0x4, 0x5a, 0x9, 0x0, 0x2d, 0x6, 0x6}}, {0x10, 0x2, [0x8000, 0x8, 0x5, 0x6, 0x5, 0x6]}}, {{0x1c, 0x1, {0x6, 0x9, 0x2000, 0x5, 0x0, 0x0, 0x4, 0x2}}, {0x8, 0x2, [0x3, 0x9]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x1}, @TCA_RATE={0x6, 0x5, {0x1, 0x80}}, @qdisc_kind_options=@q_cbq={{0x8}, {0xc4, 0x2, [@TCA_CBS_PARMS={0x18, 0x1, {0x8, '\x00', 0x3f, 0x10000, 0x0, 0x5}}, @TCA_CBS_PARMS={0x18, 0x1, {0x97, '\x00', 0xfffffffa, 0x200, 0x10000, 0xc747}}, @TCA_CBS_PARMS={0x18, 0x1, {0x6, '\x00', 0x2, 0x195, 0xf68a, 0x7}}, @TCA_CBS_PARMS={0x18, 0x1, {0xff, '\x00', 0x6, 0x2, 0x5, 0x5}}, @TCA_CBS_PARMS={0x18, 0x1, {0xe4, '\x00', 0xffffffc1, 0x9, 0xe35c, 0x8577015}}, @TCA_CBS_PARMS={0x18, 0x1, {0x20, '\x00', 0x609, 0x7, 0x9, 0x8}}, @TCA_CBS_PARMS={0x18, 0x1, {0x6, '\x00', 0x10000, 0x10001, 0x2, 0x81}}, @TCA_CBS_PARMS={0x18, 0x1, {0x0, '\x00', 0xfff, 0x9, 0xe70000, 0x1}}]}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x1}]}, 0x2d0}, 0x1, 0x0, 0x0, 0x4040000}, 0x4040844) 12:22:41 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x11, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c92", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:41 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xc000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x40, 0x1) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KDFONTOP_SET(r0, 0x7040, 0x0) r1 = open_tree(r0, &(0x7f0000000040)='./file0\x00', 0x91100) name_to_handle_at(r1, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=@fuse={0xc, 0x81, {0xa7, 0xffff, 0x9}}, &(0x7f00000001c0), 0x1000) openat(r0, &(0x7f0000000200)='./file0\x00', 0x42000, 0x100) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0xc04424, 0x0) 12:22:41 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:41 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xc000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x40, 0x1) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KDFONTOP_SET(r0, 0x7040, 0x0) r1 = open_tree(r0, &(0x7f0000000040)='./file0\x00', 0x91100) name_to_handle_at(r1, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=@fuse={0xc, 0x81, {0xa7, 0xffff, 0x9}}, &(0x7f00000001c0), 0x1000) openat(r0, &(0x7f0000000200)='./file0\x00', 0x42000, 0x100) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0xc04424, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xc000, 0x0) (async) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x40, 0x1) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$KDFONTOP_SET(r0, 0x7040, 0x0) (async) open_tree(r0, &(0x7f0000000040)='./file0\x00', 0x91100) (async) name_to_handle_at(r1, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=@fuse={0xc, 0x81, {0xa7, 0xffff, 0x9}}, &(0x7f00000001c0), 0x1000) (async) openat(r0, &(0x7f0000000200)='./file0\x00', 0x42000, 0x100) (async) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0xc04424, 0x0) (async) [ 90.539067][ T4220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 90.549125][ T4220] Call Trace: [ 90.552667][ T4220] [ 90.555596][ T4220] dump_stack_lvl+0xd6/0x122 [ 90.560202][ T4220] dump_stack+0x11/0x1b [ 90.564364][ T4220] should_fail+0x23c/0x250 [ 90.568799][ T4220] ? ext4_init_fs_context+0x21/0x50 [ 90.574017][ T4220] __should_failslab+0x81/0x90 [ 90.578866][ T4220] should_failslab+0x5/0x20 [ 90.583408][ T4220] kmem_cache_alloc_trace+0x52/0x350 [ 90.588726][ T4220] ? kmem_cache_alloc_trace+0x24b/0x350 12:22:41 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xc000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x40, 0x1) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KDFONTOP_SET(r0, 0x7040, 0x0) r1 = open_tree(r0, &(0x7f0000000040)='./file0\x00', 0x91100) name_to_handle_at(r1, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=@fuse={0xc, 0x81, {0xa7, 0xffff, 0x9}}, &(0x7f00000001c0), 0x1000) openat(r0, &(0x7f0000000200)='./file0\x00', 0x42000, 0x100) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0xc04424, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xc000, 0x0) (async) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x40, 0x1) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$KDFONTOP_SET(r0, 0x7040, 0x0) (async) open_tree(r0, &(0x7f0000000040)='./file0\x00', 0x91100) (async) name_to_handle_at(r1, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=@fuse={0xc, 0x81, {0xa7, 0xffff, 0x9}}, &(0x7f00000001c0), 0x1000) (async) openat(r0, &(0x7f0000000200)='./file0\x00', 0x42000, 0x100) (async) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0xc04424, 0x0) (async) 12:22:41 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40001, 0x30) [ 90.594359][ T4220] ext4_init_fs_context+0x21/0x50 [ 90.599393][ T4220] alloc_fs_context+0x419/0x500 [ 90.604357][ T4220] fs_context_for_reconfigure+0x42/0x50 [ 90.609937][ T4220] path_mount+0x120d/0x1c40 [ 90.614531][ T4220] __se_sys_mount+0x24b/0x2f0 [ 90.619290][ T4220] ? do_user_addr_fault+0x7d4/0xb90 [ 90.624580][ T4220] __x64_sys_mount+0x63/0x70 [ 90.629272][ T4220] do_syscall_64+0x44/0xd0 [ 90.633759][ T4220] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 90.639671][ T4220] RIP: 0033:0x7f4792e0951a 12:22:41 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40001, 0x30) [ 90.644093][ T4220] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 90.663773][ T4220] RSP: 002b:00007f4791f7df88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 90.672431][ T4220] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4792e0951a [ 90.680392][ T4220] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 90.688367][ T4220] RBP: 00007f4791f7e020 R08: 00007f4791f7e020 R09: 00000000200000c0 12:22:41 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 11) 12:22:41 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40001, 0x30) [ 90.696336][ T4220] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 90.704462][ T4220] R13: 0000000020000000 R14: 00007f4791f7dfe0 R15: 000000002001b240 [ 90.712557][ T4220] [ 90.735245][ T4252] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 90.743143][ T2205] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 90.746008][ T4250] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 90.763143][ T4253] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 90.770749][ T4259] FAULT_INJECTION: forcing a failure. [ 90.770749][ T4259] name failslab, interval 1, probability 0, space 0, times 0 [ 90.783469][ T4259] CPU: 1 PID: 4259 Comm: syz-executor.1 Not tainted 5.16.0-syzkaller #0 [ 90.785610][ T4256] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 90.791802][ T4259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 90.791816][ T4259] Call Trace: [ 90.791822][ T4259] [ 90.791829][ T4259] dump_stack_lvl+0xd6/0x122 [ 90.819015][ T4259] dump_stack+0x11/0x1b [ 90.823238][ T4259] should_fail+0x23c/0x250 [ 90.827703][ T4259] ? generic_parse_monolithic+0x142/0x1d0 [ 90.833431][ T4259] __should_failslab+0x81/0x90 [ 90.838203][ T4259] should_failslab+0x5/0x20 [ 90.842778][ T4259] __kmalloc_track_caller+0x6d/0x370 12:22:41 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:41 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:41 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:41 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x19, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d4", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:41 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x10302, 0x0) r0 = getgid() setxattr$incfs_metadata(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f00000002c0)="19a617bcd35268", 0x7, 0x2) r1 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KDFONTOP_SET(r3, 0x7040, 0x0) faccessat2(r3, &(0x7f0000000300)='./file0\x00', 0x100, 0x200) setresuid(0xee01, r2, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006d40)=[{{&(0x7f0000000f00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001000)=[{&(0x7f0000000f80)}, {0x0}], 0x2, &(0x7f0000001040)=[@cred={{0x1c, 0x1, 0x2, {0x0, r6}}}], 0x20, 0x4000940}}, {{0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1c00", @ANYRES32=r5, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x000\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=r4, @ANYRES32=r4, @ANYRES32, @ANYBLOB="00de870000000044e1d9880a86653add0c0000000000000000c30f39ea00a40700", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=r6, @ANYRESOCT, @ANYBLOB='\x00\x00 \x00'], 0xb8, 0x20000000}}, {{&(0x7f0000003c40)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000002a40)=[{0x0}, {&(0x7f0000003dc0)="05a26b37d39b9064e4bc9a04a853580790febf301972a88360e9141b7d347d213c2eb7b161591792226fd3f3910b1c75af4236ecc8eb87ec5436783af30438948c33d70592f9a7d735c5102c2753fc", 0x4f}, {&(0x7f0000003e40)="b7300accac9e76e59f07a98054f88ced6809a30fef3807ce6dd53e2677fa53638941b9141ec55271a1a20349bd3f3c2c9d61add5dc46216870428be2f631bdba14c519f26e8be5ec36ab77fd76fdeaf90b3500ddca4a8962338495ffdad52948258982dfdef97b01d10de3f195e28cb5484893763e16c1b7cfda3768c44679d10dc1e2b5736d4faa00d437c5a507d1076b537e6a9a6e779176", 0x99}, {&(0x7f0000003f00)="07a69ac95f725b954af933f78ea463f81caccc3b5c15da5498b396a0a662895c11acb6a89becbed9d70be445baa5c7cb324b81c9629a0975e6a03576e4d2071c57bd7ea05471e23206512273bafdc0e00965e66143b061ee04a092ec42bca1128ff31770baea13541c7a03f18f127de7d2f06a88b10c1e4df508b20d93769eaefed7623113630b93a79132c7614e867ff5ba24856589ab0d14f6bc2ebd3b48c35db5d3246fbe305584ff2fab85cc037bc012e777f2767102107fccb551a04d5068f1995d2b4fe6b0e6c92f921597a2c146e12cb09ed0a43eaa00f82107606f057ffbe7f7346a37d390f6c4fad3d8", 0xee}], 0x4, 0x0, 0x0, 0x24004045}}, {{&(0x7f0000004000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000055c0)=[{&(0x7f00000040c0)}, {&(0x7f0000004240)="65044ef3d1ffd53cf0805c1ec9d95b1896173c327066665daf9d46f143bd049821702c51c3c241656706ccd699302e03da4fda598bc4a7c374483dbc037ad36308db06400bd41d79d38c546ff10bc3cf756f5aa2953c56d45130ab54535694f2f00ad25dabc74a39265493f8e35ba920", 0x70}, {&(0x7f0000004300)="13495ee30240da7cbc97cb20740ddd0dcf2fe2cd3709669a296cd98d89a56f3d17352f6b86d766413e4cbffe189ef6c842bd21b733813e711176cedb7dbde3e185f58fd5a6cdd9041f81e9f282349f8fef3cf7aa8c236150269c377ede14d00330eb7581fe2eec2f430f3d04ace528788819ce8f7ae51714883042cbce2218a987eebf7f23b02bf47800aa22c45dd5fdbe062a9aea5c23e04f1baec3d866858e46f2611432bf776008e95e", 0xab}, {&(0x7f0000004400)="f524640bf202301be00fd588cea18cb92c8355df348b282a8e1b8f171bbc0a8f787a5a7ec50867239588d168216fec4492c859d03b91d8b4d05f61e5f595e0168e25f1cbc30a99fc62637dd889379022407ac56835741eb82b7f93349ca0c759abaf8f086f405ce97a582bafd297bf44f121db8302b157fc61fac5b557e6c2ddae832d39fc28bdbcd1fc94e32acd35617689584d7f86cd808302bc6bd3b3c0be5b34cb87d6f63d3563d6a086daa925f98b0c3ea35738bcca27ec7838ede0c86cfba6eb2f43c8db20b1493f89bcd9da915cc307aa77fdea0cbdb2e4ca5f8b26a81b918d0e813ed8c8", 0xe8}, {&(0x7f0000004500)="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", 0x1000}, {&(0x7f0000005500)}], 0x6, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {r8}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}], 0x58, 0x4004090}}, {{&(0x7f0000005780)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000005b80)=[{&(0x7f0000005900)="e47a8d2fdf469871e1c9450fcc9bfe43d4d2291df6087a2ba532df4c3e4151373ea5154eb2098a2274ca9e56f6fbb6775b2bb15612cab635a398ab7e631f14f482a142b067f6137362dcdd0dd2b303a83f560e4c008ef27e1d385c1d9f9a7e8854eae838318f7d32bace74c32e7f866056dd4dfaf31e", 0x76}, {&(0x7f0000005980)="bfe99c56d1be572ce13d77c94f0bc1fb67566d04de3bed0294d2d561f7ab70ced5205b1c48536263b5ee1fb585fcde4abf70735a7402c622dbed554f2e4d68629e3eb712c0290342320d7427c553000ce78e40690332b71beb3705eb79a9e01457ce0ef83c52714ba390d92fa7a21dee68534632f3d5379a4880496c498fe8159236a91456a7fbfe114c525cbbde4a374eac6f0ab62cdfd9b633e47ac63118afe32764c9036ee4384a575294e2978683fdd4a0a23d567f4a290f369db7dc1f0718029d7e02b191dc5be002b7303b17985733be99738d353dd56933eaa8224201bbb45fbf0d00b9305c1f9fcac044f27ad7072aa5", 0xf4}, {&(0x7f0000005a80)="202a38ae3872dc26008043aba1182bfa3d177a075f9c0d1c814709a70dcb795660f7c9bb271c377715c55fbbd2604a7c71a67c5e3cf24accd28b43cfb8799968d13ff69f74db755dde46e64d1ebb5da560b12357c54325aac3a8aaa872439eb9a65753fb91f5c662ee3a14fc937d9ca9a9ab54371a352f948908c6337640802b6b2f0c861bcc9bd5127f9f562749cd7357890713d2c2d5a3c0ece434941adf44d1b1bba6f7b358ce", 0xa8}, {&(0x7f0000005b40)="8c273768a25528569c84785b5356de76c75d0bf6083ec751ac77e6c0ade8ad7ec35976b32f6b2d97", 0x28}], 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="20000000000000149c00000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000000200000096a7554b71ee91cc42cd1db1cfff6e77", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r7, @ANYBLOB="00000000100000000000000001000000010000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x90, 0x80}}, {{&(0x7f0000006100)=@abs={0x0, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000006340)=ANY=[], 0xc8}}, {{0x0, 0x0, &(0x7f0000006540)=[{&(0x7f00000064c0)="fd6f9d500040abfee121029d2623d74ee45591c6fb9dcfb501c07dd32dad374a778fc36adc2fc80fd3e1df026548c53db7f0be4a459aa15d572f30c70f84efa438ac0c506e9ad7b0df2baeabacd72dcbc066", 0x52}], 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=0x0, @ANYBLOB="000000001c0013100203005a0f34a70c49c1080000000008000000000000000000", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00$\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYRES32=r4, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0xc0, 0xc800}}], 0x7, 0x3004800d) keyctl$chown(0x4, 0x0, r2, r7) chown(&(0x7f00000000c0)='./file0\x00', 0xee00, r0) 12:22:41 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x10302, 0x0) r0 = getgid() setxattr$incfs_metadata(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f00000002c0)="19a617bcd35268", 0x7, 0x2) r1 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KDFONTOP_SET(r3, 0x7040, 0x0) faccessat2(r3, &(0x7f0000000300)='./file0\x00', 0x100, 0x200) setresuid(0xee01, r2, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006d40)=[{{&(0x7f0000000f00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001000)=[{&(0x7f0000000f80)}, {0x0}], 0x2, &(0x7f0000001040)=[@cred={{0x1c, 0x1, 0x2, {0x0, r6}}}], 0x20, 0x4000940}}, {{0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1c00", @ANYRES32=r5, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x000\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=r4, @ANYRES32=r4, @ANYRES32, @ANYBLOB="00de870000000044e1d9880a86653add0c0000000000000000c30f39ea00a40700", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000700000000000000000e000000000080058ac1c73cd3398236045feea95ee4936fa6f624deeadf9ba123fb7373a31c6d723671036c7fd58392cfb73324a606e169234710f8cdaec47e9d107ccdb26d08b7b5268c5a9c0c27448c175959a4453628d8314f65e08f9fe4830e53db00a1b2e0bb2ad4468167d44b1b5fcdefa54ea55c8b92fee4f2f6c855990608f5326d6c2b29300198f7627c9210a237f52141f71a9d1e0457c70b9cb90f814696fa12ad986155a1b78333b10379ca649e6b377aa3d143ea7d8b7422f7a7f59e9a9a33e21961855ce529d44738303c6d45da395afc6d2f0a754c4b1d4606c512e80bd419bcc77a4070dccdf45aba7a279fbde6a2b9207e22906441ece53680dba516c3f996539b5cd93a5bed22c370bc319c5345b09e8400083411816e89d31e68464aef1fde572d57d671f55266cfdba87165f7455f6de33f8bc8031e4ab936f01b6650cfe937ffb8a51b9f4ffac92b96891038bb6bbef6a3c709abf9cae1abb5846e9c325ae7aa1c3d0e5dd8", @ANYRES32=0x0, @ANYRES32=r6, @ANYRESOCT, @ANYBLOB='\x00\x00 \x00'], 0xb8, 0x20000000}}, {{&(0x7f0000003c40)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000002a40)=[{0x0}, {&(0x7f0000003dc0)="05a26b37d39b9064e4bc9a04a853580790febf301972a88360e9141b7d347d213c2eb7b161591792226fd3f3910b1c75af4236ecc8eb87ec5436783af30438948c33d70592f9a7d735c5102c2753fc", 0x4f}, {&(0x7f0000003e40)="b7300accac9e76e59f07a98054f88ced6809a30fef3807ce6dd53e2677fa53638941b9141ec55271a1a20349bd3f3c2c9d61add5dc46216870428be2f631bdba14c519f26e8be5ec36ab77fd76fdeaf90b3500ddca4a8962338495ffdad52948258982dfdef97b01d10de3f195e28cb5484893763e16c1b7cfda3768c44679d10dc1e2b5736d4faa00d437c5a507d1076b537e6a9a6e779176", 0x99}, {&(0x7f0000003f00)="07a69ac95f725b954af933f78ea463f81caccc3b5c15da5498b396a0a662895c11acb6a89becbed9d70be445baa5c7cb324b81c9629a0975e6a03576e4d2071c57bd7ea05471e23206512273bafdc0e00965e66143b061ee04a092ec42bca1128ff31770baea13541c7a03f18f127de7d2f06a88b10c1e4df508b20d93769eaefed7623113630b93a79132c7614e867ff5ba24856589ab0d14f6bc2ebd3b48c35db5d3246fbe305584ff2fab85cc037bc012e777f2767102107fccb551a04d5068f1995d2b4fe6b0e6c92f921597a2c146e12cb09ed0a43eaa00f82107606f057ffbe7f7346a37d390f6c4fad3d8", 0xee}], 0x4, 0x0, 0x0, 0x24004045}}, {{&(0x7f0000004000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000055c0)=[{&(0x7f00000040c0)}, {&(0x7f0000004240)="65044ef3d1ffd53cf0805c1ec9d95b1896173c327066665daf9d46f143bd049821702c51c3c241656706ccd699302e03da4fda598bc4a7c374483dbc037ad36308db06400bd41d79d38c546ff10bc3cf756f5aa2953c56d45130ab54535694f2f00ad25dabc74a39265493f8e35ba920", 0x70}, {&(0x7f0000004300)="13495ee30240da7cbc97cb20740ddd0dcf2fe2cd3709669a296cd98d89a56f3d17352f6b86d766413e4cbffe189ef6c842bd21b733813e711176cedb7dbde3e185f58fd5a6cdd9041f81e9f282349f8fef3cf7aa8c236150269c377ede14d00330eb7581fe2eec2f430f3d04ace528788819ce8f7ae51714883042cbce2218a987eebf7f23b02bf47800aa22c45dd5fdbe062a9aea5c23e04f1baec3d866858e46f2611432bf776008e95e", 0xab}, {&(0x7f0000004400)="f524640bf202301be00fd588cea18cb92c8355df348b282a8e1b8f171bbc0a8f787a5a7ec50867239588d168216fec4492c859d03b91d8b4d05f61e5f595e0168e25f1cbc30a99fc62637dd889379022407ac56835741eb82b7f93349ca0c759abaf8f086f405ce97a582bafd297bf44f121db8302b157fc61fac5b557e6c2ddae832d39fc28bdbcd1fc94e32acd35617689584d7f86cd808302bc6bd3b3c0be5b34cb87d6f63d3563d6a086daa925f98b0c3ea35738bcca27ec7838ede0c86cfba6eb2f43c8db20b1493f89bcd9da915cc307aa77fdea0cbdb2e4ca5f8b26a81b918d0e813ed8c8", 0xe8}, {&(0x7f0000004500)="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", 0x1000}, {&(0x7f0000005500)}], 0x6, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {r8}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}], 0x58, 0x4004090}}, {{&(0x7f0000005780)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000005b80)=[{&(0x7f0000005900)="e47a8d2fdf469871e1c9450fcc9bfe43d4d2291df6087a2ba532df4c3e4151373ea5154eb2098a2274ca9e56f6fbb6775b2bb15612cab635a398ab7e631f14f482a142b067f6137362dcdd0dd2b303a83f560e4c008ef27e1d385c1d9f9a7e8854eae838318f7d32bace74c32e7f866056dd4dfaf31e", 0x76}, {&(0x7f0000005980)="bfe99c56d1be572ce13d77c94f0bc1fb67566d04de3bed0294d2d561f7ab70ced5205b1c48536263b5ee1fb585fcde4abf70735a7402c622dbed554f2e4d68629e3eb712c0290342320d7427c553000ce78e40690332b71beb3705eb79a9e01457ce0ef83c52714ba390d92fa7a21dee68534632f3d5379a4880496c498fe8159236a91456a7fbfe114c525cbbde4a374eac6f0ab62cdfd9b633e47ac63118afe32764c9036ee4384a575294e2978683fdd4a0a23d567f4a290f369db7dc1f0718029d7e02b191dc5be002b7303b17985733be99738d353dd56933eaa8224201bbb45fbf0d00b9305c1f9fcac044f27ad7072aa5", 0xf4}, {&(0x7f0000005a80)="202a38ae3872dc26008043aba1182bfa3d177a075f9c0d1c814709a70dcb795660f7c9bb271c377715c55fbbd2604a7c71a67c5e3cf24accd28b43cfb8799968d13ff69f74db755dde46e64d1ebb5da560b12357c54325aac3a8aaa872439eb9a65753fb91f5c662ee3a14fc937d9ca9a9ab54371a352f948908c6337640802b6b2f0c861bcc9bd5127f9f562749cd7357890713d2c2d5a3c0ece434941adf44d1b1bba6f7b358ce", 0xa8}, {&(0x7f0000005b40)="8c273768a25528569c84785b5356de76c75d0bf6083ec751ac77e6c0ade8ad7ec35976b32f6b2d97", 0x28}], 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="20000000000000149c00000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000000200000096a7554b71ee91cc42cd1db1cfff6e77", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r7, @ANYBLOB="00000000100000000000000001000000010000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x90, 0x80}}, {{&(0x7f0000006100)=@abs={0x0, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000006340)=ANY=[], 0xc8}}, {{0x0, 0x0, &(0x7f0000006540)=[{&(0x7f00000064c0)="fd6f9d500040abfee121029d2623d74ee45591c6fb9dcfb501c07dd32dad374a778fc36adc2fc80fd3e1df026548c53db7f0be4a459aa15d572f30c70f84efa438ac0c506e9ad7b0df2baeabacd72dcbc066", 0x52}], 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=0x0, @ANYBLOB="000000001c0013100203005a0f34a70c49c1080000000008000000000000000000", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00$\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYRES32=r4, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0xc0, 0xc800}}], 0x7, 0x3004800d) keyctl$chown(0x4, 0x0, r2, r7) chown(&(0x7f00000000c0)='./file0\x00', 0xee00, r0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async) open(&(0x7f0000000040)='./file0\x00', 0x10302, 0x0) (async) getgid() (async) setxattr$incfs_metadata(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f00000002c0)="19a617bcd35268", 0x7, 0x2) (async) socket$unix(0x1, 0x2, 0x0) (async) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$KDFONTOP_SET(r3, 0x7040, 0x0) (async) faccessat2(r3, &(0x7f0000000300)='./file0\x00', 0x100, 0x200) (async) setresuid(0xee01, r2, 0xffffffffffffffff) (async) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) (async) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) (async) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006d40)=[{{&(0x7f0000000f00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001000)=[{&(0x7f0000000f80)}, {0x0}], 0x2, &(0x7f0000001040)=[@cred={{0x1c, 0x1, 0x2, {0x0, r6}}}], 0x20, 0x4000940}}, {{0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1c00", @ANYRES32=r5, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x000\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=r4, @ANYRES32=r4, @ANYRES32, @ANYBLOB="00de870000000044e1d9880a86653add0c0000000000000000c30f39ea00a40700", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=r6, @ANYRESOCT, @ANYBLOB='\x00\x00 \x00'], 0xb8, 0x20000000}}, {{&(0x7f0000003c40)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000002a40)=[{0x0}, {&(0x7f0000003dc0)="05a26b37d39b9064e4bc9a04a853580790febf301972a88360e9141b7d347d213c2eb7b161591792226fd3f3910b1c75af4236ecc8eb87ec5436783af30438948c33d70592f9a7d735c5102c2753fc", 0x4f}, {&(0x7f0000003e40)="b7300accac9e76e59f07a98054f88ced6809a30fef3807ce6dd53e2677fa53638941b9141ec55271a1a20349bd3f3c2c9d61add5dc46216870428be2f631bdba14c519f26e8be5ec36ab77fd76fdeaf90b3500ddca4a8962338495ffdad52948258982dfdef97b01d10de3f195e28cb5484893763e16c1b7cfda3768c44679d10dc1e2b5736d4faa00d437c5a507d1076b537e6a9a6e779176", 0x99}, {&(0x7f0000003f00)="07a69ac95f725b954af933f78ea463f81caccc3b5c15da5498b396a0a662895c11acb6a89becbed9d70be445baa5c7cb324b81c9629a0975e6a03576e4d2071c57bd7ea05471e23206512273bafdc0e00965e66143b061ee04a092ec42bca1128ff31770baea13541c7a03f18f127de7d2f06a88b10c1e4df508b20d93769eaefed7623113630b93a79132c7614e867ff5ba24856589ab0d14f6bc2ebd3b48c35db5d3246fbe305584ff2fab85cc037bc012e777f2767102107fccb551a04d5068f1995d2b4fe6b0e6c92f921597a2c146e12cb09ed0a43eaa00f82107606f057ffbe7f7346a37d390f6c4fad3d8", 0xee}], 0x4, 0x0, 0x0, 0x24004045}}, {{&(0x7f0000004000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000055c0)=[{&(0x7f00000040c0)}, {&(0x7f0000004240)="65044ef3d1ffd53cf0805c1ec9d95b1896173c327066665daf9d46f143bd049821702c51c3c241656706ccd699302e03da4fda598bc4a7c374483dbc037ad36308db06400bd41d79d38c546ff10bc3cf756f5aa2953c56d45130ab54535694f2f00ad25dabc74a39265493f8e35ba920", 0x70}, {&(0x7f0000004300)="13495ee30240da7cbc97cb20740ddd0dcf2fe2cd3709669a296cd98d89a56f3d17352f6b86d766413e4cbffe189ef6c842bd21b733813e711176cedb7dbde3e185f58fd5a6cdd9041f81e9f282349f8fef3cf7aa8c236150269c377ede14d00330eb7581fe2eec2f430f3d04ace528788819ce8f7ae51714883042cbce2218a987eebf7f23b02bf47800aa22c45dd5fdbe062a9aea5c23e04f1baec3d866858e46f2611432bf776008e95e", 0xab}, {&(0x7f0000004400)="f524640bf202301be00fd588cea18cb92c8355df348b282a8e1b8f171bbc0a8f787a5a7ec50867239588d168216fec4492c859d03b91d8b4d05f61e5f595e0168e25f1cbc30a99fc62637dd889379022407ac56835741eb82b7f93349ca0c759abaf8f086f405ce97a582bafd297bf44f121db8302b157fc61fac5b557e6c2ddae832d39fc28bdbcd1fc94e32acd35617689584d7f86cd808302bc6bd3b3c0be5b34cb87d6f63d3563d6a086daa925f98b0c3ea35738bcca27ec7838ede0c86cfba6eb2f43c8db20b1493f89bcd9da915cc307aa77fdea0cbdb2e4ca5f8b26a81b918d0e813ed8c8", 0xe8}, {&(0x7f0000004500)="073fdb6eb057129910c591692a96ec02879169bd7dca0f8b3ca13d626897788fac1c79115f91514df48131f84e698ff5215cedb4ec389252c935d851cd0fe60ad00f2424e9bfa89aa360114765f62ea3ebb555e6a0a3e503944b6e5946f0d0b393292ddd8d2415318598c5e03c68f251d3272d80fb7179255bb5fbd6b3bef0e173e0a8be8692f8c502fa2d414ebdf51abbf1e52df390e4919c0dd13fb3f480e446f2c72d0d0fdd3320246ef494ab8e53329f390bbd275985a1a514609bad727b0bcff260818b3aca58fea16fd6b2936aaa99ef216107dd0d1dba0bc185bf02373ecf5f62a6b3967b45f19cfa31899cadefdb74ecae88f9412dc58d5f53a9ccd4a3c83bf33ca2ac30746ada05c560267e13d5cf5654c86b9bca5290608b424073f147108d6ea8bf878ce6c302c03d943696d6b7636e8371a069a2450a5ed4f8d6e88370207464999a3c2811916caf4dec6bd955b1a11dcb1e393b8bd2f777fd63eedf59c4dd96c84a0f864d9e7427ffa63c61caba96b9a86a11ba23ee0bca848169eee3380f74ebd3a421bd63f94946c14a944f9402195b52963e8c06f61e1c5600b087c64381b5d55c60176b3b1558febdd029574f4e8aa39b56988cadc02a2187ce3f016469d6e88e11e5714916059d2ade67b1a472ad154d5aaff96c38ad581f017fb1ff108b0a4719e3c87d56bc961b699c94c41d3ceec9c5776a7bb58c5818c28f35ab09bcc4c804bbcb95b77f6c5a7d7261ecc8aeebd4cba297d0ed4d9fb601b598c34f6e57ca0d1a6c803d8c7ffdad20ea1eca6bc63104e3ad0e7def7900f561dd0c8914ffafeae11dd3028b4b90de91269c60c8c67194094a3f62a9552c47480508b4b7dbe4cba4b569e37985f4579dd78eed2105eb4ce9b535edb7acc2b573294be7079dec43b272579abfa5de57a3d071a2c6b5097c728b72df5317d16eb93954abb3ffb3a785f1fd25c2080c5597276929854921cab95e5c0cc9ec27eaadb67c657f103b6037d4f59f11fd49b54e3b72dd8e329d8ae7992f3af8787dd39ced439d37b0107b9cfeb66152684a042e7242e4a12818185996bdfe3b0288e296a9a4a2505d1237b90c150908bef752ce4c5d048f5d69dd64567807328a3c4dddf3ed279307e9763b794a6357f738a623179fa15c8b12d5cea02b8275ca4e5d10c79db545b1b8cefe1537aa2ade5475e2106505ca41c43c4a35c79fd62e14cbd1cec848913c304c9acfab66e0bc2bfb9e9ccd744f812d742c30f8aa576bcc04e40b7f4d75adecae4fa9f3ca234d837a19e1acbc87703f314d11465070a8284f7717350a3c03de1a0edf3ac0ccbef0261f5a561fcaed3a3e7a7d69fa88b0e8651974be327394d06e692e855bb3054ef2a5436f25cf91ca5f4e429e79217bec2ded5eaf5eb133535bede0e276fc420dcd689f069ef0ceee9c82931dd3b85319d1ca71f4f7bafe892f8495ab15fdf9d2b139e6f82e45ebb3abc467cc402b908c375332b634ec1e6f4f4eae6c7da55d69a3fe82669b3de161986fa8b1f7bc76f9b85822282baca3a5f59e4cf7e7199034ebf2d4e4daa30e76303979cac30343a1e4ab8d1922ca93457f08dfec460c31ab872cbe9777336508d3e36abcf80597bde09461eb3ccb1a8f48e0ac6e84295519edef03d5eb14a6b1d05c5d27e3432443e557256bc1bc375a214f2013d29c0186ba761378fdd0ae98e7644e41e315f805382c280f0efbaeb9dff4e461e3807c07853da862df385ee1ba249f1b3c0775bac11bf02a76c2bbd47dd1a6dc5e1f00d290fd5e007613baafc5e660c0358dcdb0c606bc4aba9da375748e7fb8dfdcc4a9b0f9349b7941dbc9438ee0a1740224e47f68b64b783f814cea7fb907de3d7446db72c610456689a856e97ee864f62330059141209d4b4e5dfe97250a0460067b272b9a07c953c4bcfe8b5c4b33eaa172ca9597763537b646303c4e83d382fb9670310891a9803471aad680e61ed1487e897b1ae62a7e1cdb444c2dcd13f03e3de0f8330248c8def05ee90c2fe34f78b329b48cb81b9ccc75b0e5940852c2989a25f5bd2b36028074a55616c0ea00b1cc58883f5c093a01fa32b60fb422a040f4a3d5fa9d5e8f2822e50fed8eb84e4c81ec91bcf6d78d240d3064176a3f8a8bf0d3a3c8adb2e701ed228f18f64d07484f4aa832693d79f1d4bea421208df47ef3d0215ddc14a8d8e2f0f1f87a408fc52ac325b7670e0e124a3371133c5479501689c2d8db1b0909e19a2c1e3328592aa133392124c278b9e49537cbf5e4a603f099a598e0106c3aeadf91b4f9c2577ad845992091c1c8dcf441933772482cbd53acb18dc6bc21ea610a97088eae640e32e9a3e73c7dc7ef84c05943fd8c7c3aec7c0be1b5240ce0b54aecfe258a8aeaf69503205faeec6dd38eabe0f448738363a5fd99675c2a13fcae2ab0580b96647c45b20fe0f5ca48007c84425ccd1cac38f9161fb6906f43d5de9c7208bab95d218805c03669791f7103927e71b80e673970ef66a80a7e3ff46a8e8cfbae63cd7047f90e896aea42223c43a3ea934e8d02c65d203039eb11d9390de6043686fab720f9316bd7c262b7d7d452dbfabd974a676b87979f6defcc6fd28d5044ca3412327aed4e9dd7de87b241097d52292cba9f923998387c287fcbf6f80182b257caf656ef537eb4e1ae795f4994d687002ad17a3599d39d911f822135ab746d113cbb62fd06053e6dd5e1c49ee7cc22aaeaa4afb32ca2076f456d3e42a7f4afac407dbe2c7f017269de4d70f6028690061222300aeab373a86c5febf714deeae64ef93c74ce9e13714338fdad84da072cd4ad4d43b8602a3bf2d6fc6b612d169a35b413fd4a35ad4a87210b6a86f9f9f73e19bc0809ff47697d5a10c262c130c191eefda88245d7f3f0d9fe96debd46fef3650525458cea5ee77952048deb441be58a05ba2a6b3be6448f48c208a4767a9d8c1a9690fa00e547c7c4620b2a473f83db24615f25c37a1f31863cccdacfba08b5fb28a0369fc40116cb3857849a797662d2fb77112a51e623ec1685f501a628ec543204fb5697d2a071da8a249bb2c45089e143a7e5e8c491955e8a25c4849aff933e180f0e1f0802fff7c740f7c3dd23c6d375a55cec057c3833274ef8a046e5159f3deb3b5d4970026ab95900694bac42c2ccb28f67e9ff965d3f409c3d9200860330ef89747bda418b5be8e9391577958ac17f4faefb4c19faf7dd6802174195c92157156395742031f511e3ef8d413a1cb6f56c1af8293b040bd54494678e876405ac58d3a11a8a57a27521c343a575e51b0fd4ebdb6bbbafd1a9987d14fcaabb4b9aae10c4e102517cc2029803a34d51ff091a72e9da45361a1a9280af7342cd6cdd64b8e5adbd82ea30a7400201c485928a78c20044b9b6cba5129c3fd48302356223038af40af14c0befb8c6211dbf0ac75d0e6ea6f34dd448bbe51a2fd72081b097b257971ee5a25559d7b615ede2dcefee96d2490b7c49f16db163705d5f0cf2cddbb7fb7539b6d9a6c2979cd5691df1cdead6a9ba9640405a2a3ac6e1db956944afea0b3542d2ad51d8f9f5fd8c086e5d5e55407928587e92d3dec52ac22cc8ef941b3a8ec1eea78aa880d66d14ca93c0f4b0066a22b78617f511bd4c24cf2a9ed87ae3204fe3f5bc938da4025603181d9b0c9ec80e31a9a2f57191e92d45454ac7c1d7d71ddde744cd3128faf5f0f8e53632d04c894a75b941b2c0ab5650467297cdf99ca7f74bdc236fad1cc41243d05491e3449c3f312e9aa6082709117ce85f3b524946a110c0f827448eae6e70486793d3b61295c3868d45e0b7adba0bada5d53208fe771c873fc13e913645442bb6e4ded4ebbf710f618cb23d8d197bb3f0ac9d816201e46ae314356bd4703644b4ffa311fa2eb87fceaeebceda6474889f8b488344bbdbf21e7ac4a824837b5109417f69bf679731ecd88d33159c178d6560553741694f4170f7a599a06789b4f411536eb510e647d08e9675aa0006f00a64b270237bb7ef63a1537f18d75e9287d8104160907f334f9314a733458c8d99764e2a23f61be3b76d061babad94f34613dbd2cffa45ea5b0fc6f21b4c065b7aaa5201419a2e654683ecdc624cbd616ac008fea87d3cdf43b1f61222716a16726f1c3be71261f572401bee4218e668c3cbf7011af0398dd5f5d100d9481c810d48962432d4985c8a309332b7b6d47d96801a682319099d37b3040cfd14aafc1064a260be1c67b212635037cf17913eb33565534d081380a9b79838a1379439cea809945e061e7145efccaad9a1c282f7457e95588c77c10c4e52e429d51b2ea8a05f650c14c16ee801c6700f058bad5fae6cd18132d601a4e05404a59334646cef868d258eb6a9de6c63ff939ccdf1c7b41e49b164d6e22a29832f15811b0e7c930d53130de2582d4490a1b0a2a3ebe2d9f07683a189eec17d97c848739d290e80a29cc17685ee6a327ddbbcaf0dfa0c811574b9c7b2247704cf11ab8cea96db4de058e19d39cf6de8b44c153a8f062311372a6c90b45666032a49338762ae299ba314df023407befeefc7f0d22d53b3dd941f6fa88eda0e4bdbea82fe286b4b901dc25f6ef52c0ce4d0c91e40e4fe8ef4a83e9ff04a02581b8a5a494c00f17a067eacf55dc90ba7ee4647a61280fccda25e1c2a228dabb726a77964e54f6858294e7d0c7514b6834be0892a6e01d11286744b257e2423fb9a3e53898bb97b59fd30ced3659cba16da4c2975dbd7e9640f0181bbdd0e8458ca3b3e6308256c7c103863048c57f55ceed2a7b391d3244ffcfdcdbbab3ecf31ba78a63dc730084c371131e0d2e3f9e566163830d128913b62ef57aca8be557c00a828dbc3a0185fbff239f070b615c5cb84e8e80a1e726eec8f40e961d088638290e892a2c7297c713b5b2187746cc36d1fd5f6c87aa9c2056d720f24ec901785f00b13f72ea8fe06dfd6ba9d0ed55dfb273d363f5f932c538ec53f9c4e38de03f6f23a8957566eab2f905100e5bd427309cc7230b4c3bd7108989c2eea9f0079ee208fc3938d4563c791f1c37e17db4a585e2f3963e5e87291719616124b6a8757dd9dd46a1136b4e633678d3037874bd20e6a1bc96cb0bf507dd7e6e54672ae12ee600915a6916ea46087d94e5374247415df268b1cb2fba591ef7b4e6343afd2fb7dcebf7cc4af6209e17d1927d0f72b87acc87490b6b8099264b7d388da3a6abbcb65369481c1ef14e663519dc2e0ff3cc5a8b468cc7d08a39dc753e03f49fb996a04199b057c40a24ecbb9fdcdf423408a358eaa026de8befdab7635e95b36674993f2892a64a12fe9941357c39560adba21f23a29137a989d6cc185d92d0cd3ca21d53be10dac6f62796cbc21934f0c2dca8f7a68a5d59c2005574cc16cbc3d54d5dedd5f6086e79bd136a99df041dff3bd16476bda8336397f9d8d62b734db5c58a4ae750635f1e08c431e2f3a50761e82d3f906def38623b28f885211a61c5a6a0c44732e6b46dba1f28d34b9f5b800e005e348f08ace831485057a1b9dd9fa2f8fe3450078b2060432d1af2338fd697ea0d20239fa878706a014c20f4ab4136544ce8de787ddf70172ea622763df97a24e9ba48342aaf1f4e8aa67fd1e6344ea15307804e00d30f4bcafce11f1af2a3d2869970349fb4d8d9beab8459a6007ba3edae1149ec891e1a45b9c0094663972252deb19bb4ed7a7ea8f576bbd3c705b3951f91b4d6b09538287505d15f5dee9934428704e95d03302cf3eb17be2aff4f30ceca401f72495711bb9", 0x1000}, {&(0x7f0000005500)}], 0x6, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {r8}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}], 0x58, 0x4004090}}, {{&(0x7f0000005780)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000005b80)=[{&(0x7f0000005900)="e47a8d2fdf469871e1c9450fcc9bfe43d4d2291df6087a2ba532df4c3e4151373ea5154eb2098a2274ca9e56f6fbb6775b2bb15612cab635a398ab7e631f14f482a142b067f6137362dcdd0dd2b303a83f560e4c008ef27e1d385c1d9f9a7e8854eae838318f7d32bace74c32e7f866056dd4dfaf31e", 0x76}, {&(0x7f0000005980)="bfe99c56d1be572ce13d77c94f0bc1fb67566d04de3bed0294d2d561f7ab70ced5205b1c48536263b5ee1fb585fcde4abf70735a7402c622dbed554f2e4d68629e3eb712c0290342320d7427c553000ce78e40690332b71beb3705eb79a9e01457ce0ef83c52714ba390d92fa7a21dee68534632f3d5379a4880496c498fe8159236a91456a7fbfe114c525cbbde4a374eac6f0ab62cdfd9b633e47ac63118afe32764c9036ee4384a575294e2978683fdd4a0a23d567f4a290f369db7dc1f0718029d7e02b191dc5be002b7303b17985733be99738d353dd56933eaa8224201bbb45fbf0d00b9305c1f9fcac044f27ad7072aa5", 0xf4}, {&(0x7f0000005a80)="202a38ae3872dc26008043aba1182bfa3d177a075f9c0d1c814709a70dcb795660f7c9bb271c377715c55fbbd2604a7c71a67c5e3cf24accd28b43cfb8799968d13ff69f74db755dde46e64d1ebb5da560b12357c54325aac3a8aaa872439eb9a65753fb91f5c662ee3a14fc937d9ca9a9ab54371a352f948908c6337640802b6b2f0c861bcc9bd5127f9f562749cd7357890713d2c2d5a3c0ece434941adf44d1b1bba6f7b358ce", 0xa8}, {&(0x7f0000005b40)="8c273768a25528569c84785b5356de76c75d0bf6083ec751ac77e6c0ade8ad7ec35976b32f6b2d97", 0x28}], 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="20000000000000149c00000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000000200000096a7554b71ee91cc42cd1db1cfff6e77", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r7, @ANYBLOB="00000000100000000000000001000000010000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x90, 0x80}}, {{&(0x7f0000006100)=@abs={0x0, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000006340)=ANY=[], 0xc8}}, {{0x0, 0x0, &(0x7f0000006540)=[{&(0x7f00000064c0)="fd6f9d500040abfee121029d2623d74ee45591c6fb9dcfb501c07dd32dad374a778fc36adc2fc80fd3e1df026548c53db7f0be4a459aa15d572f30c70f84efa438ac0c506e9ad7b0df2baeabacd72dcbc066", 0x52}], 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=0x0, @ANYBLOB="000000001c0013100203005a0f34a70c49c1080000000008000000000000000000", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00$\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYRES32=r4, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0xc0, 0xc800}}], 0x7, 0x3004800d) (async) keyctl$chown(0x4, 0x0, r2, r7) (async) chown(&(0x7f00000000c0)='./file0\x00', 0xee00, r0) (async) [ 90.848170][ T4259] kmemdup_nul+0x27/0x70 [ 90.852491][ T4259] generic_parse_monolithic+0x142/0x1d0 [ 90.858055][ T4259] parse_monolithic_mount_data+0x3e/0x50 [ 90.863702][ T4259] path_mount+0x125d/0x1c40 [ 90.868233][ T4259] __se_sys_mount+0x24b/0x2f0 [ 90.872916][ T4259] ? do_user_addr_fault+0x7d4/0xb90 [ 90.878121][ T4259] __x64_sys_mount+0x63/0x70 [ 90.882745][ T4259] do_syscall_64+0x44/0xd0 [ 90.887193][ T4259] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 90.893249][ T4259] RIP: 0033:0x7f4792e0951a 12:22:41 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x10302, 0x0) r0 = getgid() (async, rerun: 64) setxattr$incfs_metadata(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f00000002c0)="19a617bcd35268", 0x7, 0x2) (async, rerun: 64) r1 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KDFONTOP_SET(r3, 0x7040, 0x0) (async) faccessat2(r3, &(0x7f0000000300)='./file0\x00', 0x100, 0x200) setresuid(0xee01, r2, 0xffffffffffffffff) (async) r4 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) (async) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006d40)=[{{&(0x7f0000000f00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001000)=[{&(0x7f0000000f80)}, {0x0}], 0x2, &(0x7f0000001040)=[@cred={{0x1c, 0x1, 0x2, {0x0, r6}}}], 0x20, 0x4000940}}, {{0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1c00", @ANYRES32=r5, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x000\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=r4, @ANYRES32=r4, @ANYRES32, @ANYBLOB="00de870000000044e1d9880a86653add0c0000000000000000c30f39ea00a40700", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=r6, @ANYRESOCT, @ANYBLOB='\x00\x00 \x00'], 0xb8, 0x20000000}}, {{&(0x7f0000003c40)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000002a40)=[{0x0}, {&(0x7f0000003dc0)="05a26b37d39b9064e4bc9a04a853580790febf301972a88360e9141b7d347d213c2eb7b161591792226fd3f3910b1c75af4236ecc8eb87ec5436783af30438948c33d70592f9a7d735c5102c2753fc", 0x4f}, {&(0x7f0000003e40)="b7300accac9e76e59f07a98054f88ced6809a30fef3807ce6dd53e2677fa53638941b9141ec55271a1a20349bd3f3c2c9d61add5dc46216870428be2f631bdba14c519f26e8be5ec36ab77fd76fdeaf90b3500ddca4a8962338495ffdad52948258982dfdef97b01d10de3f195e28cb5484893763e16c1b7cfda3768c44679d10dc1e2b5736d4faa00d437c5a507d1076b537e6a9a6e779176", 0x99}, {&(0x7f0000003f00)="07a69ac95f725b954af933f78ea463f81caccc3b5c15da5498b396a0a662895c11acb6a89becbed9d70be445baa5c7cb324b81c9629a0975e6a03576e4d2071c57bd7ea05471e23206512273bafdc0e00965e66143b061ee04a092ec42bca1128ff31770baea13541c7a03f18f127de7d2f06a88b10c1e4df508b20d93769eaefed7623113630b93a79132c7614e867ff5ba24856589ab0d14f6bc2ebd3b48c35db5d3246fbe305584ff2fab85cc037bc012e777f2767102107fccb551a04d5068f1995d2b4fe6b0e6c92f921597a2c146e12cb09ed0a43eaa00f82107606f057ffbe7f7346a37d390f6c4fad3d8", 0xee}], 0x4, 0x0, 0x0, 0x24004045}}, {{&(0x7f0000004000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000055c0)=[{&(0x7f00000040c0)}, {&(0x7f0000004240)="65044ef3d1ffd53cf0805c1ec9d95b1896173c327066665daf9d46f143bd049821702c51c3c241656706ccd699302e03da4fda598bc4a7c374483dbc037ad36308db06400bd41d79d38c546ff10bc3cf756f5aa2953c56d45130ab54535694f2f00ad25dabc74a39265493f8e35ba920", 0x70}, {&(0x7f0000004300)="13495ee30240da7cbc97cb20740ddd0dcf2fe2cd3709669a296cd98d89a56f3d17352f6b86d766413e4cbffe189ef6c842bd21b733813e711176cedb7dbde3e185f58fd5a6cdd9041f81e9f282349f8fef3cf7aa8c236150269c377ede14d00330eb7581fe2eec2f430f3d04ace528788819ce8f7ae51714883042cbce2218a987eebf7f23b02bf47800aa22c45dd5fdbe062a9aea5c23e04f1baec3d866858e46f2611432bf776008e95e", 0xab}, {&(0x7f0000004400)="f524640bf202301be00fd588cea18cb92c8355df348b282a8e1b8f171bbc0a8f787a5a7ec50867239588d168216fec4492c859d03b91d8b4d05f61e5f595e0168e25f1cbc30a99fc62637dd889379022407ac56835741eb82b7f93349ca0c759abaf8f086f405ce97a582bafd297bf44f121db8302b157fc61fac5b557e6c2ddae832d39fc28bdbcd1fc94e32acd35617689584d7f86cd808302bc6bd3b3c0be5b34cb87d6f63d3563d6a086daa925f98b0c3ea35738bcca27ec7838ede0c86cfba6eb2f43c8db20b1493f89bcd9da915cc307aa77fdea0cbdb2e4ca5f8b26a81b918d0e813ed8c8", 0xe8}, {&(0x7f0000004500)="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", 0x1000}, {&(0x7f0000005500)}], 0x6, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {r8}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}], 0x58, 0x4004090}}, {{&(0x7f0000005780)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000005b80)=[{&(0x7f0000005900)="e47a8d2fdf469871e1c9450fcc9bfe43d4d2291df6087a2ba532df4c3e4151373ea5154eb2098a2274ca9e56f6fbb6775b2bb15612cab635a398ab7e631f14f482a142b067f6137362dcdd0dd2b303a83f560e4c008ef27e1d385c1d9f9a7e8854eae838318f7d32bace74c32e7f866056dd4dfaf31e", 0x76}, {&(0x7f0000005980)="bfe99c56d1be572ce13d77c94f0bc1fb67566d04de3bed0294d2d561f7ab70ced5205b1c48536263b5ee1fb585fcde4abf70735a7402c622dbed554f2e4d68629e3eb712c0290342320d7427c553000ce78e40690332b71beb3705eb79a9e01457ce0ef83c52714ba390d92fa7a21dee68534632f3d5379a4880496c498fe8159236a91456a7fbfe114c525cbbde4a374eac6f0ab62cdfd9b633e47ac63118afe32764c9036ee4384a575294e2978683fdd4a0a23d567f4a290f369db7dc1f0718029d7e02b191dc5be002b7303b17985733be99738d353dd56933eaa8224201bbb45fbf0d00b9305c1f9fcac044f27ad7072aa5", 0xf4}, {&(0x7f0000005a80)="202a38ae3872dc26008043aba1182bfa3d177a075f9c0d1c814709a70dcb795660f7c9bb271c377715c55fbbd2604a7c71a67c5e3cf24accd28b43cfb8799968d13ff69f74db755dde46e64d1ebb5da560b12357c54325aac3a8aaa872439eb9a65753fb91f5c662ee3a14fc937d9ca9a9ab54371a352f948908c6337640802b6b2f0c861bcc9bd5127f9f562749cd7357890713d2c2d5a3c0ece434941adf44d1b1bba6f7b358ce", 0xa8}, {&(0x7f0000005b40)="8c273768a25528569c84785b5356de76c75d0bf6083ec751ac77e6c0ade8ad7ec35976b32f6b2d97", 0x28}], 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="20000000000000149c00000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000000200000096a7554b71ee91cc42cd1db1cfff6e77", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r7, @ANYBLOB="00000000100000000000000001000000010000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x90, 0x80}}, {{&(0x7f0000006100)=@abs={0x0, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000006340)=ANY=[], 0xc8}}, {{0x0, 0x0, &(0x7f0000006540)=[{&(0x7f00000064c0)="fd6f9d500040abfee121029d2623d74ee45591c6fb9dcfb501c07dd32dad374a778fc36adc2fc80fd3e1df026548c53db7f0be4a459aa15d572f30c70f84efa438ac0c506e9ad7b0df2baeabacd72dcbc066", 0x52}], 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=0x0, @ANYBLOB="000000001c0013100203005a0f34a70c49c1080000000008000000000000000000", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00$\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYRES32=r4, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0xc0, 0xc800}}], 0x7, 0x3004800d) (async, rerun: 64) keyctl$chown(0x4, 0x0, r2, r7) (rerun: 64) chown(&(0x7f00000000c0)='./file0\x00', 0xee00, r0) [ 90.897719][ T4259] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 90.917353][ T4259] RSP: 002b:00007f4791f7df88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 90.925769][ T4259] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4792e0951a [ 90.933746][ T4259] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 90.941741][ T4259] RBP: 00007f4791f7e020 R08: 00007f4791f7e020 R09: 00000000200000c0 [ 90.949801][ T4259] R10: 000000000001c4a6 R11: 0000000000000206 R12: 00000000200000c0 [ 90.957819][ T4259] R13: 0000000020000000 R14: 00007f4791f7dfe0 R15: 000000002001b240 [ 90.965824][ T4259] [ 90.985358][ T4288] EXT4-fs (sda1): re-mounted. Quota mode: none. 12:22:41 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 12) 12:22:41 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="d07366"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) chroot(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='ext4\x00', 0x1128000, &(0x7f0000000300)='-\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) syz_genetlink_get_family_id$gtp(&(0x7f0000000400), 0xffffffffffffffff) connect$unix(r0, &(0x7f0000000380)=@abs={0x0, 0x0, 0x4e23}, 0x6e) r1 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006d40)=[{{&(0x7f0000000f00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001000)=[{&(0x7f0000000f80)}, {0x0}], 0x2, &(0x7f0000001040)=[@cred={{0x1c, 0x1, 0x2, {0x0, r3}}}], 0x20, 0x4000940}}, {{0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1c00", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x000\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32, @ANYBLOB="00de870000000044e1d9880a86653add0c0000000000000000c30f39ea00a40700", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=r3, @ANYRESOCT, @ANYBLOB='\x00\x00 \x00'], 0xb8, 0x20000000}}, {{&(0x7f0000003c40)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000002a40)=[{0x0}, {&(0x7f0000003dc0)="05a26b37d39b9064e4bc9a04a853580790febf301972a88360e9141b7d347d213c2eb7b161591792226fd3f3910b1c75af4236ecc8eb87ec5436783af30438948c33d70592f9a7d735c5102c2753fc", 0x4f}, {&(0x7f0000003e40)="b7300accac9e76e59f07a98054f88ced6809a30fef3807ce6dd53e2677fa53638941b9141ec55271a1a20349bd3f3c2c9d61add5dc46216870428be2f631bdba14c519f26e8be5ec36ab77fd76fdeaf90b3500ddca4a8962338495ffdad52948258982dfdef97b01d10de3f195e28cb5484893763e16c1b7cfda3768c44679d10dc1e2b5736d4faa00d437c5a507d1076b537e6a9a6e779176", 0x99}, {&(0x7f0000003f00)="07a69ac95f725b954af933f78ea463f81caccc3b5c15da5498b396a0a662895c11acb6a89becbed9d70be445baa5c7cb324b81c9629a0975e6a03576e4d2071c57bd7ea05471e23206512273bafdc0e00965e66143b061ee04a092ec42bca1128ff31770baea13541c7a03f18f127de7d2f06a88b10c1e4df508b20d93769eaefed7623113630b93a79132c7614e867ff5ba24856589ab0d14f6bc2ebd3b48c35db5d3246fbe305584ff2fab85cc037bc012e777f2767102107fccb551a04d5068f1995d2b4fe6b0e6c92f921597a2c146e12cb09ed0a43eaa00f82107606f057ffbe7f7346a37d390f6c4fad3d8", 0xee}], 0x4, 0x0, 0x0, 0x24004045}}, {{&(0x7f0000004000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000055c0)=[{&(0x7f00000040c0)}, {&(0x7f0000004240)="65044ef3d1ffd53cf0805c1ec9d95b1896173c327066665daf9d46f143bd049821702c51c3c241656706ccd699302e03da4fda598bc4a7c374483dbc037ad36308db06400bd41d79d38c546ff10bc3cf756f5aa2953c56d45130ab54535694f2f00ad25dabc74a39265493f8e35ba920", 0x70}, {&(0x7f0000004300)="13495ee30240da7cbc97cb20740ddd0dcf2fe2cd3709669a296cd98d89a56f3d17352f6b86d766413e4cbffe189ef6c842bd21b733813e711176cedb7dbde3e185f58fd5a6cdd9041f81e9f282349f8fef3cf7aa8c236150269c377ede14d00330eb7581fe2eec2f430f3d04ace528788819ce8f7ae51714883042cbce2218a987eebf7f23b02bf47800aa22c45dd5fdbe062a9aea5c23e04f1baec3d866858e46f2611432bf776008e95e", 0xab}, {&(0x7f0000004400)="f524640bf202301be00fd588cea18cb92c8355df348b282a8e1b8f171bbc0a8f787a5a7ec50867239588d168216fec4492c859d03b91d8b4d05f61e5f595e0168e25f1cbc30a99fc62637dd889379022407ac56835741eb82b7f93349ca0c759abaf8f086f405ce97a582bafd297bf44f121db8302b157fc61fac5b557e6c2ddae832d39fc28bdbcd1fc94e32acd35617689584d7f86cd808302bc6bd3b3c0be5b34cb87d6f63d3563d6a086daa925f98b0c3ea35738bcca27ec7838ede0c86cfba6eb2f43c8db20b1493f89bcd9da915cc307aa77fdea0cbdb2e4ca5f8b26a81b918d0e813ed8c8", 0xe8}, {&(0x7f0000004500)="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", 0x1000}, {&(0x7f0000005500)}], 0x6, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {r5}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}], 0x58, 0x4004090}}, {{&(0x7f0000005780)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000005b80)=[{&(0x7f0000005900)="e47a8d2fdf469871e1c9450fcc9bfe43d4d2291df6087a2ba532df4c3e4151373ea5154eb2098a2274ca9e56f6fbb6775b2bb15612cab635a398ab7e631f14f482a142b067f6137362dcdd0dd2b303a83f560e4c008ef27e1d385c1d9f9a7e8854eae838318f7d32bace74c32e7f866056dd4dfaf31e", 0x76}, {&(0x7f0000005980)="bfe99c56d1be572ce13d77c94f0bc1fb67566d04de3bed0294d2d561f7ab70ced5205b1c48536263b5ee1fb585fcde4abf70735a7402c622dbed554f2e4d68629e3eb712c0290342320d7427c553000ce78e40690332b71beb3705eb79a9e01457ce0ef83c52714ba390d92fa7a21dee68534632f3d5379a4880496c498fe8159236a91456a7fbfe114c525cbbde4a374eac6f0ab62cdfd9b633e47ac63118afe32764c9036ee4384a575294e2978683fdd4a0a23d567f4a290f369db7dc1f0718029d7e02b191dc5be002b7303b17985733be99738d353dd56933eaa8224201bbb45fbf0d00b9305c1f9fcac044f27ad7072aa5", 0xf4}, {&(0x7f0000005a80)="202a38ae3872dc26008043aba1182bfa3d177a075f9c0d1c814709a70dcb795660f7c9bb271c377715c55fbbd2604a7c71a67c5e3cf24accd28b43cfb8799968d13ff69f74db755dde46e64d1ebb5da560b12357c54325aac3a8aaa872439eb9a65753fb91f5c662ee3a14fc937d9ca9a9ab54371a352f948908c6337640802b6b2f0c861bcc9bd5127f9f562749cd7357890713d2c2d5a3c0ece434941adf44d1b1bba6f7b358ce", 0xa8}, {&(0x7f0000005b40)="8c273768a25528569c84785b5356de76c75d0bf6083ec751ac77e6c0ade8ad7ec35976b32f6b2d97", 0x28}], 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="20000000000000149c00000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000000200000096a7554b71ee91cc42cd1db1cfff6e77", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="00000000100000000000000001000000010000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="00030000"], 0x90, 0x80}}, {{&(0x7f0000006100)=@abs={0x0, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000006340)=ANY=[], 0xc8}}, {{0x0, 0x0, &(0x7f0000006540)=[{&(0x7f00000064c0)="fd6f9d500040abfee121029d2623d74ee45591c6fb9dcfb501c07dd32dad374a778fc36adc2fc80fd3e1df026548c53db7f0be4a459aa15d572f30c70f84efa438ac0c506e9ad7b0df2baeabacd72dcbc066", 0x52}], 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=0x0, @ANYBLOB="000000001c0013100203005a0f34a70c49c1080000000008000000000000000000", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00$\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES32=r1, @ANYRES32, @ANYRES32, @ANYRES32=r1, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0xc0, 0xc800}}], 0x7, 0x3004800d) r6 = socket$unix(0x1, 0x2, 0x0) chdir(&(0x7f0000000640)='./file0\x00') getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r7, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000440), &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0), 0x88, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r4}}, {@privport}, {@noextend}, {@access_uid={'access', 0x3d, 0xee01}}, {@access_client}], [{@smackfsfloor}, {@obj_role={'obj_role', 0x3d, '-\x00'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@euid_eq={'euid', 0x3d, r7}}, {@audit}, {@obj_role={'obj_role', 0x3d, 'iso9660\x00'}}]}}) link(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file0\x00') [ 90.997923][ T4291] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 91.004419][ T4292] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 91.032521][ T4296] FAULT_INJECTION: forcing a failure. [ 91.032521][ T4296] name failslab, interval 1, probability 0, space 0, times 0 12:22:41 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x18, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:41 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x18, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:41 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x19, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d4", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:41 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x18, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:41 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="d07366"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) chroot(&(0x7f0000000100)='./file0\x00') (async) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='ext4\x00', 0x1128000, &(0x7f0000000300)='-\x00') (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) (rerun: 64) syz_genetlink_get_family_id$gtp(&(0x7f0000000400), 0xffffffffffffffff) connect$unix(r0, &(0x7f0000000380)=@abs={0x0, 0x0, 0x4e23}, 0x6e) r1 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) (async) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006d40)=[{{&(0x7f0000000f00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001000)=[{&(0x7f0000000f80)}, {0x0}], 0x2, &(0x7f0000001040)=[@cred={{0x1c, 0x1, 0x2, {0x0, r3}}}], 0x20, 0x4000940}}, {{0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1c00", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x000\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32, @ANYBLOB="00de870000000044e1d9880a86653add0c0000000000000000c30f39ea00a40700", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=r3, @ANYRESOCT, @ANYBLOB='\x00\x00 \x00'], 0xb8, 0x20000000}}, {{&(0x7f0000003c40)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000002a40)=[{0x0}, {&(0x7f0000003dc0)="05a26b37d39b9064e4bc9a04a853580790febf301972a88360e9141b7d347d213c2eb7b161591792226fd3f3910b1c75af4236ecc8eb87ec5436783af30438948c33d70592f9a7d735c5102c2753fc", 0x4f}, {&(0x7f0000003e40)="b7300accac9e76e59f07a98054f88ced6809a30fef3807ce6dd53e2677fa53638941b9141ec55271a1a20349bd3f3c2c9d61add5dc46216870428be2f631bdba14c519f26e8be5ec36ab77fd76fdeaf90b3500ddca4a8962338495ffdad52948258982dfdef97b01d10de3f195e28cb5484893763e16c1b7cfda3768c44679d10dc1e2b5736d4faa00d437c5a507d1076b537e6a9a6e779176", 0x99}, {&(0x7f0000003f00)="07a69ac95f725b954af933f78ea463f81caccc3b5c15da5498b396a0a662895c11acb6a89becbed9d70be445baa5c7cb324b81c9629a0975e6a03576e4d2071c57bd7ea05471e23206512273bafdc0e00965e66143b061ee04a092ec42bca1128ff31770baea13541c7a03f18f127de7d2f06a88b10c1e4df508b20d93769eaefed7623113630b93a79132c7614e867ff5ba24856589ab0d14f6bc2ebd3b48c35db5d3246fbe305584ff2fab85cc037bc012e777f2767102107fccb551a04d5068f1995d2b4fe6b0e6c92f921597a2c146e12cb09ed0a43eaa00f82107606f057ffbe7f7346a37d390f6c4fad3d8", 0xee}], 0x4, 0x0, 0x0, 0x24004045}}, {{&(0x7f0000004000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000055c0)=[{&(0x7f00000040c0)}, {&(0x7f0000004240)="65044ef3d1ffd53cf0805c1ec9d95b1896173c327066665daf9d46f143bd049821702c51c3c241656706ccd699302e03da4fda598bc4a7c374483dbc037ad36308db06400bd41d79d38c546ff10bc3cf756f5aa2953c56d45130ab54535694f2f00ad25dabc74a39265493f8e35ba920", 0x70}, {&(0x7f0000004300)="13495ee30240da7cbc97cb20740ddd0dcf2fe2cd3709669a296cd98d89a56f3d17352f6b86d766413e4cbffe189ef6c842bd21b733813e711176cedb7dbde3e185f58fd5a6cdd9041f81e9f282349f8fef3cf7aa8c236150269c377ede14d00330eb7581fe2eec2f430f3d04ace528788819ce8f7ae51714883042cbce2218a987eebf7f23b02bf47800aa22c45dd5fdbe062a9aea5c23e04f1baec3d866858e46f2611432bf776008e95e", 0xab}, {&(0x7f0000004400)="f524640bf202301be00fd588cea18cb92c8355df348b282a8e1b8f171bbc0a8f787a5a7ec50867239588d168216fec4492c859d03b91d8b4d05f61e5f595e0168e25f1cbc30a99fc62637dd889379022407ac56835741eb82b7f93349ca0c759abaf8f086f405ce97a582bafd297bf44f121db8302b157fc61fac5b557e6c2ddae832d39fc28bdbcd1fc94e32acd35617689584d7f86cd808302bc6bd3b3c0be5b34cb87d6f63d3563d6a086daa925f98b0c3ea35738bcca27ec7838ede0c86cfba6eb2f43c8db20b1493f89bcd9da915cc307aa77fdea0cbdb2e4ca5f8b26a81b918d0e813ed8c8", 0xe8}, {&(0x7f0000004500)="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", 0x1000}, {&(0x7f0000005500)}], 0x6, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {r5}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}], 0x58, 0x4004090}}, {{&(0x7f0000005780)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000005b80)=[{&(0x7f0000005900)="e47a8d2fdf469871e1c9450fcc9bfe43d4d2291df6087a2ba532df4c3e4151373ea5154eb2098a2274ca9e56f6fbb6775b2bb15612cab635a398ab7e631f14f482a142b067f6137362dcdd0dd2b303a83f560e4c008ef27e1d385c1d9f9a7e8854eae838318f7d32bace74c32e7f866056dd4dfaf31e", 0x76}, {&(0x7f0000005980)="bfe99c56d1be572ce13d77c94f0bc1fb67566d04de3bed0294d2d561f7ab70ced5205b1c48536263b5ee1fb585fcde4abf70735a7402c622dbed554f2e4d68629e3eb712c0290342320d7427c553000ce78e40690332b71beb3705eb79a9e01457ce0ef83c52714ba390d92fa7a21dee68534632f3d5379a4880496c498fe8159236a91456a7fbfe114c525cbbde4a374eac6f0ab62cdfd9b633e47ac63118afe32764c9036ee4384a575294e2978683fdd4a0a23d567f4a290f369db7dc1f0718029d7e02b191dc5be002b7303b17985733be99738d353dd56933eaa8224201bbb45fbf0d00b9305c1f9fcac044f27ad7072aa5", 0xf4}, {&(0x7f0000005a80)="202a38ae3872dc26008043aba1182bfa3d177a075f9c0d1c814709a70dcb795660f7c9bb271c377715c55fbbd2604a7c71a67c5e3cf24accd28b43cfb8799968d13ff69f74db755dde46e64d1ebb5da560b12357c54325aac3a8aaa872439eb9a65753fb91f5c662ee3a14fc937d9ca9a9ab54371a352f948908c6337640802b6b2f0c861bcc9bd5127f9f562749cd7357890713d2c2d5a3c0ece434941adf44d1b1bba6f7b358ce", 0xa8}, {&(0x7f0000005b40)="8c273768a25528569c84785b5356de76c75d0bf6083ec751ac77e6c0ade8ad7ec35976b32f6b2d97", 0x28}], 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="20000000000000149c00000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000000200000096a7554b71ee91cc42cd1db1cfff6e77", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="00000000100000000000000001000000010000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="00030000"], 0x90, 0x80}}, {{&(0x7f0000006100)=@abs={0x0, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000006340)=ANY=[], 0xc8}}, {{0x0, 0x0, &(0x7f0000006540)=[{&(0x7f00000064c0)="fd6f9d500040abfee121029d2623d74ee45591c6fb9dcfb501c07dd32dad374a778fc36adc2fc80fd3e1df026548c53db7f0be4a459aa15d572f30c70f84efa438ac0c506e9ad7b0df2baeabacd72dcbc066", 0x52}], 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=0x0, @ANYBLOB="000000001c0013100203005a0f34a70c49c1080000000008000000000000000000", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00$\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES32=r1, @ANYRES32, @ANYRES32, @ANYRES32=r1, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0xc0, 0xc800}}], 0x7, 0x3004800d) (async) r6 = socket$unix(0x1, 0x2, 0x0) chdir(&(0x7f0000000640)='./file0\x00') (async, rerun: 32) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) (rerun: 32) setresuid(0xee01, r7, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000440), &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0), 0x88, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r4}}, {@privport}, {@noextend}, {@access_uid={'access', 0x3d, 0xee01}}, {@access_client}], [{@smackfsfloor}, {@obj_role={'obj_role', 0x3d, '-\x00'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@euid_eq={'euid', 0x3d, r7}}, {@audit}, {@obj_role={'obj_role', 0x3d, 'iso9660\x00'}}]}}) (async) link(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file0\x00') 12:22:41 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="d07366"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) chroot(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='ext4\x00', 0x1128000, &(0x7f0000000300)='-\x00') ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) syz_genetlink_get_family_id$gtp(&(0x7f0000000400), 0xffffffffffffffff) connect$unix(r0, &(0x7f0000000380)=@abs={0x0, 0x0, 0x4e23}, 0x6e) r1 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006d40)=[{{&(0x7f0000000f00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001000)=[{&(0x7f0000000f80)}, {0x0}], 0x2, &(0x7f0000001040)=[@cred={{0x1c, 0x1, 0x2, {0x0, r3}}}], 0x20, 0x4000940}}, {{0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1c00", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x000\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32, @ANYBLOB="00de870000000044e1d9880a86653add0c0000000000000000c30f39ea00a40700", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=r3, @ANYRESOCT, @ANYBLOB='\x00\x00 \x00'], 0xb8, 0x20000000}}, {{&(0x7f0000003c40)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000002a40)=[{0x0}, {&(0x7f0000003dc0)="05a26b37d39b9064e4bc9a04a853580790febf301972a88360e9141b7d347d213c2eb7b161591792226fd3f3910b1c75af4236ecc8eb87ec5436783af30438948c33d70592f9a7d735c5102c2753fc", 0x4f}, {&(0x7f0000003e40)="b7300accac9e76e59f07a98054f88ced6809a30fef3807ce6dd53e2677fa53638941b9141ec55271a1a20349bd3f3c2c9d61add5dc46216870428be2f631bdba14c519f26e8be5ec36ab77fd76fdeaf90b3500ddca4a8962338495ffdad52948258982dfdef97b01d10de3f195e28cb5484893763e16c1b7cfda3768c44679d10dc1e2b5736d4faa00d437c5a507d1076b537e6a9a6e779176", 0x99}, {&(0x7f0000003f00)="07a69ac95f725b954af933f78ea463f81caccc3b5c15da5498b396a0a662895c11acb6a89becbed9d70be445baa5c7cb324b81c9629a0975e6a03576e4d2071c57bd7ea05471e23206512273bafdc0e00965e66143b061ee04a092ec42bca1128ff31770baea13541c7a03f18f127de7d2f06a88b10c1e4df508b20d93769eaefed7623113630b93a79132c7614e867ff5ba24856589ab0d14f6bc2ebd3b48c35db5d3246fbe305584ff2fab85cc037bc012e777f2767102107fccb551a04d5068f1995d2b4fe6b0e6c92f921597a2c146e12cb09ed0a43eaa00f82107606f057ffbe7f7346a37d390f6c4fad3d8", 0xee}], 0x4, 0x0, 0x0, 0x24004045}}, {{&(0x7f0000004000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000055c0)=[{&(0x7f00000040c0)}, {&(0x7f0000004240)="65044ef3d1ffd53cf0805c1ec9d95b1896173c327066665daf9d46f143bd049821702c51c3c241656706ccd699302e03da4fda598bc4a7c374483dbc037ad36308db06400bd41d79d38c546ff10bc3cf756f5aa2953c56d45130ab54535694f2f00ad25dabc74a39265493f8e35ba920", 0x70}, {&(0x7f0000004300)="13495ee30240da7cbc97cb20740ddd0dcf2fe2cd3709669a296cd98d89a56f3d17352f6b86d766413e4cbffe189ef6c842bd21b733813e711176cedb7dbde3e185f58fd5a6cdd9041f81e9f282349f8fef3cf7aa8c236150269c377ede14d00330eb7581fe2eec2f430f3d04ace528788819ce8f7ae51714883042cbce2218a987eebf7f23b02bf47800aa22c45dd5fdbe062a9aea5c23e04f1baec3d866858e46f2611432bf776008e95e", 0xab}, {&(0x7f0000004400)="f524640bf202301be00fd588cea18cb92c8355df348b282a8e1b8f171bbc0a8f787a5a7ec50867239588d168216fec4492c859d03b91d8b4d05f61e5f595e0168e25f1cbc30a99fc62637dd889379022407ac56835741eb82b7f93349ca0c759abaf8f086f405ce97a582bafd297bf44f121db8302b157fc61fac5b557e6c2ddae832d39fc28bdbcd1fc94e32acd35617689584d7f86cd808302bc6bd3b3c0be5b34cb87d6f63d3563d6a086daa925f98b0c3ea35738bcca27ec7838ede0c86cfba6eb2f43c8db20b1493f89bcd9da915cc307aa77fdea0cbdb2e4ca5f8b26a81b918d0e813ed8c8", 0xe8}, {&(0x7f0000004500)="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", 0x1000}, {&(0x7f0000005500)}], 0x6, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {r5}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}], 0x58, 0x4004090}}, {{&(0x7f0000005780)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000005b80)=[{&(0x7f0000005900)="e47a8d2fdf469871e1c9450fcc9bfe43d4d2291df6087a2ba532df4c3e4151373ea5154eb2098a2274ca9e56f6fbb6775b2bb15612cab635a398ab7e631f14f482a142b067f6137362dcdd0dd2b303a83f560e4c008ef27e1d385c1d9f9a7e8854eae838318f7d32bace74c32e7f866056dd4dfaf31e", 0x76}, {&(0x7f0000005980)="bfe99c56d1be572ce13d77c94f0bc1fb67566d04de3bed0294d2d561f7ab70ced5205b1c48536263b5ee1fb585fcde4abf70735a7402c622dbed554f2e4d68629e3eb712c0290342320d7427c553000ce78e40690332b71beb3705eb79a9e01457ce0ef83c52714ba390d92fa7a21dee68534632f3d5379a4880496c498fe8159236a91456a7fbfe114c525cbbde4a374eac6f0ab62cdfd9b633e47ac63118afe32764c9036ee4384a575294e2978683fdd4a0a23d567f4a290f369db7dc1f0718029d7e02b191dc5be002b7303b17985733be99738d353dd56933eaa8224201bbb45fbf0d00b9305c1f9fcac044f27ad7072aa5", 0xf4}, {&(0x7f0000005a80)="202a38ae3872dc26008043aba1182bfa3d177a075f9c0d1c814709a70dcb795660f7c9bb271c377715c55fbbd2604a7c71a67c5e3cf24accd28b43cfb8799968d13ff69f74db755dde46e64d1ebb5da560b12357c54325aac3a8aaa872439eb9a65753fb91f5c662ee3a14fc937d9ca9a9ab54371a352f948908c6337640802b6b2f0c861bcc9bd5127f9f562749cd7357890713d2c2d5a3c0ece434941adf44d1b1bba6f7b358ce", 0xa8}, {&(0x7f0000005b40)="8c273768a25528569c84785b5356de76c75d0bf6083ec751ac77e6c0ade8ad7ec35976b32f6b2d97", 0x28}], 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="20000000000000149c00000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000000200000096a7554b71ee91cc42cd1db1cfff6e77", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="00000000100000000000000001000000010000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="00030000"], 0x90, 0x80}}, {{&(0x7f0000006100)=@abs={0x0, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000006340)=ANY=[], 0xc8}}, {{0x0, 0x0, &(0x7f0000006540)=[{&(0x7f00000064c0)="fd6f9d500040abfee121029d2623d74ee45591c6fb9dcfb501c07dd32dad374a778fc36adc2fc80fd3e1df026548c53db7f0be4a459aa15d572f30c70f84efa438ac0c506e9ad7b0df2baeabacd72dcbc066", 0x52}], 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=0x0, @ANYBLOB="000000001c0013100203005a0f34a70c49c1080000000008000000000000000000", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00$\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES32=r1, @ANYRES32, @ANYRES32, @ANYRES32=r1, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0xc0, 0xc800}}], 0x7, 0x3004800d) r6 = socket$unix(0x1, 0x2, 0x0) chdir(&(0x7f0000000640)='./file0\x00') getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r7, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000440), &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0), 0x88, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r4}}, {@privport}, {@noextend}, {@access_uid={'access', 0x3d, 0xee01}}, {@access_client}], [{@smackfsfloor}, {@obj_role={'obj_role', 0x3d, '-\x00'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@euid_eq={'euid', 0x3d, r7}}, {@audit}, {@obj_role={'obj_role', 0x3d, 'iso9660\x00'}}]}}) link(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file0\x00') mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="d07366"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async) chroot(&(0x7f0000000100)='./file0\x00') (async) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') (async) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='ext4\x00', 0x1128000, &(0x7f0000000300)='-\x00') (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) syz_genetlink_get_family_id$gtp(&(0x7f0000000400), 0xffffffffffffffff) (async) connect$unix(r0, &(0x7f0000000380)=@abs={0x0, 0x0, 0x4e23}, 0x6e) (async) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) (async) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) (async) [ 91.045289][ T4296] CPU: 0 PID: 4296 Comm: syz-executor.1 Not tainted 5.16.0-syzkaller #0 [ 91.053659][ T4296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 91.063731][ T4296] Call Trace: [ 91.067012][ T4296] [ 91.069946][ T4296] dump_stack_lvl+0xd6/0x122 [ 91.074651][ T4296] dump_stack+0x11/0x1b [ 91.078905][ T4296] should_fail+0x23c/0x250 [ 91.083369][ T4296] ? getname_flags+0x84/0x3f0 [ 91.088055][ T4296] __should_failslab+0x81/0x90 [ 91.092832][ T4296] should_failslab+0x5/0x20 [ 91.097345][ T4296] kmem_cache_alloc+0x4f/0x320 [ 91.102201][ T4296] getname_flags+0x84/0x3f0 [ 91.106763][ T4296] getname+0x15/0x20 [ 91.111166][ T4296] do_sys_openat2+0x6d/0x2b0 [ 91.115745][ T4296] __x64_sys_openat+0xef/0x110 [ 91.120545][ T4296] do_syscall_64+0x44/0xd0 [ 91.125105][ T4296] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 91.131025][ T4296] RIP: 0033:0x7f4792dbaf04 [ 91.135424][ T4296] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 91.155136][ T4296] RSP: 002b:00007f4791f7df10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 91.163545][ T4296] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4792dbaf04 [ 91.171517][ T4296] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 91.179494][ T4296] RBP: 0000000020000000 R08: 0000000000000000 R09: 00000000200000c0 [ 91.187494][ T4296] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006d40)=[{{&(0x7f0000000f00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001000)=[{&(0x7f0000000f80)}, {0x0}], 0x2, &(0x7f0000001040)=[@cred={{0x1c, 0x1, 0x2, {0x0, r3}}}], 0x20, 0x4000940}}, {{0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1c00", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x000\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32, @ANYBLOB="00de870000000044e1d9880a86653add0c0000000000000000c30f39ea00a40700", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=r3, @ANYRESOCT, @ANYBLOB='\x00\x00 \x00'], 0xb8, 0x20000000}}, {{&(0x7f0000003c40)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000002a40)=[{0x0}, {&(0x7f0000003dc0)="05a26b37d39b9064e4bc9a04a853580790febf301972a88360e9141b7d347d213c2eb7b161591792226fd3f3910b1c75af4236ecc8eb87ec5436783af30438948c33d70592f9a7d735c5102c2753fc", 0x4f}, {&(0x7f0000003e40)="b7300accac9e76e59f07a98054f88ced6809a30fef3807ce6dd53e2677fa53638941b9141ec55271a1a20349bd3f3c2c9d61add5dc46216870428be2f631bdba14c519f26e8be5ec36ab77fd76fdeaf90b3500ddca4a8962338495ffdad52948258982dfdef97b01d10de3f195e28cb5484893763e16c1b7cfda3768c44679d10dc1e2b5736d4faa00d437c5a507d1076b537e6a9a6e779176", 0x99}, {&(0x7f0000003f00)="07a69ac95f725b954af933f78ea463f81caccc3b5c15da5498b396a0a662895c11acb6a89becbed9d70be445baa5c7cb324b81c9629a0975e6a03576e4d2071c57bd7ea05471e23206512273bafdc0e00965e66143b061ee04a092ec42bca1128ff31770baea13541c7a03f18f127de7d2f06a88b10c1e4df508b20d93769eaefed7623113630b93a79132c7614e867ff5ba24856589ab0d14f6bc2ebd3b48c35db5d3246fbe305584ff2fab85cc037bc012e777f2767102107fccb551a04d5068f1995d2b4fe6b0e6c92f921597a2c146e12cb09ed0a43eaa00f82107606f057ffbe7f7346a37d390f6c4fad3d8", 0xee}], 0x4, 0x0, 0x0, 0x24004045}}, {{&(0x7f0000004000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000055c0)=[{&(0x7f00000040c0)}, {&(0x7f0000004240)="65044ef3d1ffd53cf0805c1ec9d95b1896173c327066665daf9d46f143bd049821702c51c3c241656706ccd699302e03da4fda598bc4a7c374483dbc037ad36308db06400bd41d79d38c546ff10bc3cf756f5aa2953c56d45130ab54535694f2f00ad25dabc74a39265493f8e35ba920", 0x70}, {&(0x7f0000004300)="13495ee30240da7cbc97cb20740ddd0dcf2fe2cd3709669a296cd98d89a56f3d17352f6b86d766413e4cbffe189ef6c842bd21b733813e711176cedb7dbde3e185f58fd5a6cdd9041f81e9f282349f8fef3cf7aa8c236150269c377ede14d00330eb7581fe2eec2f430f3d04ace528788819ce8f7ae51714883042cbce2218a987eebf7f23b02bf47800aa22c45dd5fdbe062a9aea5c23e04f1baec3d866858e46f2611432bf776008e95e", 0xab}, {&(0x7f0000004400)="f524640bf202301be00fd588cea18cb92c8355df348b282a8e1b8f171bbc0a8f787a5a7ec50867239588d168216fec4492c859d03b91d8b4d05f61e5f595e0168e25f1cbc30a99fc62637dd889379022407ac56835741eb82b7f93349ca0c759abaf8f086f405ce97a582bafd297bf44f121db8302b157fc61fac5b557e6c2ddae832d39fc28bdbcd1fc94e32acd35617689584d7f86cd808302bc6bd3b3c0be5b34cb87d6f63d3563d6a086daa925f98b0c3ea35738bcca27ec7838ede0c86cfba6eb2f43c8db20b1493f89bcd9da915cc307aa77fdea0cbdb2e4ca5f8b26a81b918d0e813ed8c8", 0xe8}, {&(0x7f0000004500)="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", 0x1000}, {&(0x7f0000005500)}], 0x6, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {r5}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}], 0x58, 0x4004090}}, {{&(0x7f0000005780)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000005b80)=[{&(0x7f0000005900)="e47a8d2fdf469871e1c9450fcc9bfe43d4d2291df6087a2ba532df4c3e4151373ea5154eb2098a2274ca9e56f6fbb6775b2bb15612cab635a398ab7e631f14f482a142b067f6137362dcdd0dd2b303a83f560e4c008ef27e1d385c1d9f9a7e8854eae838318f7d32bace74c32e7f866056dd4dfaf31e", 0x76}, {&(0x7f0000005980)="bfe99c56d1be572ce13d77c94f0bc1fb67566d04de3bed0294d2d561f7ab70ced5205b1c48536263b5ee1fb585fcde4abf70735a7402c622dbed554f2e4d68629e3eb712c0290342320d7427c553000ce78e40690332b71beb3705eb79a9e01457ce0ef83c52714ba390d92fa7a21dee68534632f3d5379a4880496c498fe8159236a91456a7fbfe114c525cbbde4a374eac6f0ab62cdfd9b633e47ac63118afe32764c9036ee4384a575294e2978683fdd4a0a23d567f4a290f369db7dc1f0718029d7e02b191dc5be002b7303b17985733be99738d353dd56933eaa8224201bbb45fbf0d00b9305c1f9fcac044f27ad7072aa5", 0xf4}, {&(0x7f0000005a80)="202a38ae3872dc26008043aba1182bfa3d177a075f9c0d1c814709a70dcb795660f7c9bb271c377715c55fbbd2604a7c71a67c5e3cf24accd28b43cfb8799968d13ff69f74db755dde46e64d1ebb5da560b12357c54325aac3a8aaa872439eb9a65753fb91f5c662ee3a14fc937d9ca9a9ab54371a352f948908c6337640802b6b2f0c861bcc9bd5127f9f562749cd7357890713d2c2d5a3c0ece434941adf44d1b1bba6f7b358ce", 0xa8}, {&(0x7f0000005b40)="8c273768a25528569c84785b5356de76c75d0bf6083ec751ac77e6c0ade8ad7ec35976b32f6b2d97", 0x28}], 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="20000000000000149c00000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c00000000000000010000000200000096a7554b71ee91cc42cd1db1cfff6e77", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="00000000100000000000000001000000010000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="00030000"], 0x90, 0x80}}, {{&(0x7f0000006100)=@abs={0x0, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000006340)=ANY=[], 0xc8}}, {{0x0, 0x0, &(0x7f0000006540)=[{&(0x7f00000064c0)="fd6f9d500040abfee121029d2623d74ee45591c6fb9dcfb501c07dd32dad374a778fc36adc2fc80fd3e1df026548c53db7f0be4a459aa15d572f30c70f84efa438ac0c506e9ad7b0df2baeabacd72dcbc066", 0x52}], 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=0x0, @ANYBLOB="000000001c0013100203005a0f34a70c49c1080000000008000000000000000000", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00$\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES32=r1, @ANYRES32, @ANYRES32, @ANYRES32=r1, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0xc0, 0xc800}}], 0x7, 0x3004800d) (async) socket$unix(0x1, 0x2, 0x0) (async) chdir(&(0x7f0000000640)='./file0\x00') (async) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) (async) setresuid(0xee01, r7, 0xffffffffffffffff) (async) mount$9p_tcp(&(0x7f0000000440), &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0), 0x88, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r4}}, {@privport}, {@noextend}, {@access_uid={'access', 0x3d, 0xee01}}, {@access_client}], [{@smackfsfloor}, {@obj_role={'obj_role', 0x3d, '-\x00'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@euid_eq={'euid', 0x3d, r7}}, {@audit}, {@obj_role={'obj_role', 0x3d, 'iso9660\x00'}}]}}) (async) link(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file0\x00') (async) 12:22:41 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) unshare(0x42020400) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) accept4(r3, &(0x7f0000000180)=@pppol2tpv3, &(0x7f0000000240)=0x80, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x2e0180, 0x8c) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) 12:22:42 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x22, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:42 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x22, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) [ 91.195478][ T4296] R13: 0000000020000000 R14: 00007f4791f7dfe0 R15: 000000002001b240 [ 91.203543][ T4296] 12:22:42 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x19, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d4", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:42 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 13) 12:22:42 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x22, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:42 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x26, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) [ 91.288733][ T4337] FAULT_INJECTION: forcing a failure. [ 91.288733][ T4337] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 91.301837][ T4337] CPU: 0 PID: 4337 Comm: syz-executor.1 Not tainted 5.16.0-syzkaller #0 [ 91.310226][ T4337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 91.320283][ T4337] Call Trace: [ 91.323560][ T4337] [ 91.326516][ T4337] dump_stack_lvl+0xd6/0x122 [ 91.331190][ T4337] dump_stack+0x11/0x1b [ 91.335350][ T4337] should_fail+0x23c/0x250 [ 91.339804][ T4337] should_fail_usercopy+0x16/0x20 [ 91.344835][ T4337] strncpy_from_user+0x21/0x250 [ 91.349686][ T4337] getname_flags+0xb8/0x3f0 [ 91.354188][ T4337] getname+0x15/0x20 [ 91.358138][ T4337] do_sys_openat2+0x6d/0x2b0 [ 91.362817][ T4337] __x64_sys_openat+0xef/0x110 [ 91.367657][ T4337] do_syscall_64+0x44/0xd0 [ 91.372264][ T4337] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 91.378228][ T4337] RIP: 0033:0x7f4792dbaf04 [ 91.382649][ T4337] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 91.402527][ T4337] RSP: 002b:00007f4791f7df10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 91.410941][ T4337] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4792dbaf04 [ 91.418918][ T4337] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 91.426905][ T4337] RBP: 0000000020000000 R08: 0000000000000000 R09: 00000000200000c0 12:22:42 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x26, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:42 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x26, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:42 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x46, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) [ 91.434874][ T4337] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 91.442844][ T4337] R13: 0000000020000000 R14: 00007f4791f7dfe0 R15: 000000002001b240 [ 91.450817][ T4337] 12:22:42 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x46, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:42 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x46, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:42 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async, rerun: 64) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) (async, rerun: 64) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) (async) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) (async) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async) unshare(0x42020400) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) accept4(r3, &(0x7f0000000180)=@pppol2tpv3, &(0x7f0000000240)=0x80, 0x0) (async) open$dir(&(0x7f0000000040)='./file0\x00', 0x2e0180, 0x8c) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) 12:22:42 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1d, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f390", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:42 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 14) 12:22:42 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x300, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:42 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x300, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:42 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x300, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:42 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x700, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:42 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x700, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:42 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x700, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) [ 91.970862][ T4365] FAULT_INJECTION: forcing a failure. [ 91.970862][ T4365] name failslab, interval 1, probability 0, space 0, times 0 [ 91.983591][ T4365] CPU: 0 PID: 4365 Comm: syz-executor.1 Not tainted 5.16.0-syzkaller #0 [ 91.991924][ T4365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 92.002008][ T4365] Call Trace: [ 92.005286][ T4365] [ 92.008227][ T4365] dump_stack_lvl+0xd6/0x122 [ 92.012954][ T4365] dump_stack+0x11/0x1b [ 92.017112][ T4365] should_fail+0x23c/0x250 [ 92.021520][ T4365] ? __alloc_file+0x2e/0x1a0 [ 92.026177][ T4365] __should_failslab+0x81/0x90 [ 92.030932][ T4365] should_failslab+0x5/0x20 [ 92.035486][ T4365] kmem_cache_alloc+0x4f/0x320 [ 92.040251][ T4365] __alloc_file+0x2e/0x1a0 [ 92.044666][ T4365] alloc_empty_file+0xcd/0x1c0 [ 92.049433][ T4365] path_openat+0x6a/0x1f30 [ 92.053838][ T4365] ? ___ratelimit+0x25d/0x2b0 [ 92.058530][ T4365] ? debug_smp_processor_id+0x18/0x20 [ 92.063886][ T4365] ? mod_objcg_state+0x490/0x5c0 [ 92.068811][ T4365] ? refill_obj_stock+0x140/0x220 [ 92.073820][ T4365] ? __rcu_read_unlock+0x5c/0x290 [ 92.078838][ T4365] ? __rcu_read_lock+0x32/0x40 [ 92.083652][ T4365] do_filp_open+0x105/0x220 [ 92.088215][ T4365] do_sys_openat2+0xb5/0x2b0 [ 92.092792][ T4365] __x64_sys_openat+0xef/0x110 [ 92.097541][ T4365] do_syscall_64+0x44/0xd0 [ 92.102029][ T4365] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 92.108025][ T4365] RIP: 0033:0x7f4792dbaf04 [ 92.112630][ T4365] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 92.132279][ T4365] RSP: 002b:00007f4791f7df10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 92.140683][ T4365] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4792dbaf04 [ 92.148643][ T4365] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 92.156728][ T4365] RBP: 0000000020000000 R08: 0000000000000000 R09: 00000000200000c0 12:22:43 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) (async) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) (async) sched_setattr(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) (async) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) (async) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) unshare(0x42020400) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) accept4(r3, &(0x7f0000000180)=@pppol2tpv3, &(0x7f0000000240)=0x80, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x2e0180, 0x8c) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) 12:22:43 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 15) 12:22:43 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1d, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f390", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) [ 92.164688][ T4365] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 92.172734][ T4365] R13: 0000000020000000 R14: 00007f4791f7dfe0 R15: 000000002001b240 [ 92.180696][ T4365] 12:22:43 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1800, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:43 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1800, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:43 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1800, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:43 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2200, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) [ 92.290328][ T4397] FAULT_INJECTION: forcing a failure. [ 92.290328][ T4397] name failslab, interval 1, probability 0, space 0, times 0 [ 92.303017][ T4397] CPU: 0 PID: 4397 Comm: syz-executor.1 Not tainted 5.16.0-syzkaller #0 [ 92.311384][ T4397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 92.321439][ T4397] Call Trace: [ 92.324716][ T4397] [ 92.327656][ T4397] dump_stack_lvl+0xd6/0x122 [ 92.332330][ T4397] dump_stack+0x11/0x1b [ 92.336489][ T4397] should_fail+0x23c/0x250 [ 92.340915][ T4397] ? security_file_alloc+0x30/0x190 [ 92.346245][ T4397] __should_failslab+0x81/0x90 [ 92.351015][ T4397] should_failslab+0x5/0x20 [ 92.355523][ T4397] kmem_cache_alloc+0x4f/0x320 [ 92.360320][ T4397] security_file_alloc+0x30/0x190 [ 92.365427][ T4397] __alloc_file+0x83/0x1a0 [ 92.369942][ T4397] alloc_empty_file+0xcd/0x1c0 [ 92.374782][ T4397] path_openat+0x6a/0x1f30 [ 92.379231][ T4397] ? ___ratelimit+0x25d/0x2b0 [ 92.383910][ T4397] ? __rcu_read_unlock+0x5c/0x290 [ 92.389009][ T4397] ? debug_smp_processor_id+0x18/0x20 [ 92.394553][ T4397] ? mod_objcg_state+0x490/0x5c0 [ 92.399664][ T4397] ? refill_obj_stock+0x15f/0x220 [ 92.404765][ T4397] ? __rcu_read_unlock+0x5c/0x290 [ 92.409791][ T4397] ? __rcu_read_lock+0x32/0x40 [ 92.414576][ T4397] do_filp_open+0x105/0x220 [ 92.419085][ T4397] do_sys_openat2+0xb5/0x2b0 [ 92.423675][ T4397] __x64_sys_openat+0xef/0x110 [ 92.428511][ T4397] do_syscall_64+0x44/0xd0 [ 92.432940][ T4397] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 92.438843][ T4397] RIP: 0033:0x7f4792dbaf04 [ 92.443260][ T4397] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 92.462905][ T4397] RSP: 002b:00007f4791f7df10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 92.471316][ T4397] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4792dbaf04 [ 92.479355][ T4397] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c 12:22:43 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2200, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:43 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1d, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f390", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:43 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2200, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:43 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2600, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) [ 92.487358][ T4397] RBP: 0000000020000000 R08: 0000000000000000 R09: 00000000200000c0 [ 92.495337][ T4397] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 92.503365][ T4397] R13: 0000000020000000 R14: 00007f4791f7dfe0 R15: 000000002001b240 [ 92.511391][ T4397] 12:22:43 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) (fail_nth: 16) [ 92.594767][ T4409] FAULT_INJECTION: forcing a failure. [ 92.594767][ T4409] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 92.607955][ T4409] CPU: 0 PID: 4409 Comm: syz-executor.1 Not tainted 5.16.0-syzkaller #0 [ 92.616376][ T4409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 92.626433][ T4409] Call Trace: [ 92.629711][ T4409] [ 92.632636][ T4409] dump_stack_lvl+0xd6/0x122 [ 92.637278][ T4409] dump_stack+0x11/0x1b [ 92.641444][ T4409] should_fail+0x23c/0x250 [ 92.645951][ T4409] should_fail_usercopy+0x16/0x20 [ 92.651320][ T4409] _copy_to_user+0x1c/0x90 [ 92.655722][ T4409] simple_read_from_buffer+0xab/0x120 [ 92.661227][ T4409] proc_fail_nth_read+0x10d/0x150 [ 92.666242][ T4409] ? proc_fault_inject_write+0x230/0x230 [ 92.671876][ T4409] vfs_read+0x1e6/0x750 [ 92.676039][ T4409] ? __fget_files+0x1d2/0x210 [ 92.680763][ T4409] ksys_read+0xd9/0x190 [ 92.684940][ T4409] __x64_sys_read+0x3e/0x50 [ 92.689443][ T4409] do_syscall_64+0x44/0xd0 [ 92.693869][ T4409] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 92.699779][ T4409] RIP: 0033:0x7f4792dbab9c [ 92.704193][ T4409] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 92.723878][ T4409] RSP: 002b:00007f4791f7e160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 92.732361][ T4409] RAX: ffffffffffffffda RBX: 00007f4792f1af60 RCX: 00007f4792dbab9c [ 92.740326][ T4409] RDX: 000000000000000f RSI: 00007f4791f7e1e0 RDI: 0000000000000003 [ 92.748370][ T4409] RBP: 00007f4791f7e1d0 R08: 0000000000000000 R09: 00000000200000c0 [ 92.756361][ T4409] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 92.764487][ T4409] R13: 00007ffdef6e944f R14: 00007f4791f7e300 R15: 0000000000022000 [ 92.772456][ T4409] 12:22:43 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) faccessat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x9d12cc9b97cffe1d, 0x1100) mount$cgroup(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x8, &(0x7f0000000180)={[{@name={'name', 0x3d, 'iso9660\x00'}}, {@xattr}, {@noprefix}], [{@appraise_type}]}) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='iso9660\x00', 0x0, 0x0) 12:22:43 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2600, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:43 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f00, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:43 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:43 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2600, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:43 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:43 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f00, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:43 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f00, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:43 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:43 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:43 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:43 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) [ 93.100218][ T4423] cgroup: No subsys list or none specified 12:22:43 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) faccessat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x9d12cc9b97cffe1d, 0x1100) mount$cgroup(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x8, &(0x7f0000000180)={[{@name={'name', 0x3d, 'iso9660\x00'}}, {@xattr}, {@noprefix}], [{@appraise_type}]}) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='iso9660\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) faccessat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x9d12cc9b97cffe1d, 0x1100) (async) mount$cgroup(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x8, &(0x7f0000000180)={[{@name={'name', 0x3d, 'iso9660\x00'}}, {@xattr}, {@noprefix}], [{@appraise_type}]}) (async) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='iso9660\x00', 0x0, 0x0) (async) 12:22:43 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:43 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4600, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:43 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:43 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4600, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:43 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4600, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x80000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:44 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x80000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) [ 93.189435][ T4442] cgroup: No subsys list or none specified 12:22:44 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) [ 93.231653][ T4448] cgroup: No subsys list or none specified 12:22:44 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) faccessat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x9d12cc9b97cffe1d, 0x1100) (async) mount$cgroup(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x8, &(0x7f0000000180)={[{@name={'name', 0x3d, 'iso9660\x00'}}, {@xattr}, {@noprefix}], [{@appraise_type}]}) (async) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='iso9660\x00', 0x0, 0x0) 12:22:44 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x80000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x20, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12d", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:44 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 4: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) open(&(0x7f0000000080)='./file0\x00', 0x4000, 0x10) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="4477072b7e266b78000d2eca8418cb2dc098b6df87ab43eb1175157562b525f139ce274f79681d67f7552c2b636037bd20fa6fc6a768518380e9b6c5c54d73c573eb893a0f9c6ac0121335218409fe9c1d8e15fb1e71a62e9bd503933e2b080801fe8a6d9ce8173c55a78f0d50fe989b3b1fab0b1dc937ceca59a449e3eb8888e8c1feaf936ca863603238ba455070352250cae6de0878c4b21785eb3a56addef029c56a8237c47ce28516209b0f78dc", @ANYRES64=r0], &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x4, 0x0) 12:22:44 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x18, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x20, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12d", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:44 executing program 4: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) open(&(0x7f0000000080)='./file0\x00', 0x4000, 0x10) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="4477072b7e266b78000d2eca8418cb2dc098b6df87ab43eb1175157562b525f139ce274f79681d67f7552c2b636037bd20fa6fc6a768518380e9b6c5c54d73c573eb893a0f9c6ac0121335218409fe9c1d8e15fb1e71a62e9bd503933e2b080801fe8a6d9ce8173c55a78f0d50fe989b3b1fab0b1dc937ceca59a449e3eb8888e8c1feaf936ca863603238ba455070352250cae6de0878c4b21785eb3a56addef029c56a8237c47ce28516209b0f78dc", @ANYRES64=r0], &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x4, 0x0) 12:22:44 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x22, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x26, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x20, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12d", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:44 executing program 4: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) open(&(0x7f0000000080)='./file0\x00', 0x4000, 0x10) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="4477072b7e266b78000d2eca8418cb2dc098b6df87ab43eb1175157562b525f139ce274f79681d67f7552c2b636037bd20fa6fc6a768518380e9b6c5c54d73c573eb893a0f9c6ac0121335218409fe9c1d8e15fb1e71a62e9bd503933e2b080801fe8a6d9ce8173c55a78f0d50fe989b3b1fab0b1dc937ceca59a449e3eb8888e8c1feaf936ca863603238ba455070352250cae6de0878c4b21785eb3a56addef029c56a8237c47ce28516209b0f78dc", @ANYRES64=r0], &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x4, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) (async) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) open(&(0x7f0000000080)='./file0\x00', 0x4000, 0x10) (async) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="4477072b7e266b78000d2eca8418cb2dc098b6df87ab43eb1175157562b525f139ce274f79681d67f7552c2b636037bd20fa6fc6a768518380e9b6c5c54d73c573eb893a0f9c6ac0121335218409fe9c1d8e15fb1e71a62e9bd503933e2b080801fe8a6d9ce8173c55a78f0d50fe989b3b1fab0b1dc937ceca59a449e3eb8888e8c1feaf936ca863603238ba455070352250cae6de0878c4b21785eb3a56addef029c56a8237c47ce28516209b0f78dc", @ANYRES64=r0], &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x4, 0x0) (async) 12:22:44 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x46, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x300, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:44 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x18000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2e2f03ef64e3ff94b0d1d5f9dc51540787c2104197ff265ffe4f05d2b1d5e02d7b3a32"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/50, 0x32) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="4454ee158e80f60520aa6e0c2a73d2daabbdeefc6967a5f3682267b6dcda9de4d277abfb6005b5b7293002e21c1f4e21358796186edae12baf002dccd71da75c62c60b10d6e66f2dae2776ae4c4a6f1720cc8b5ebee67c20309713dc23f1d0e929df929b58e76d4272da420f51a1d8332d27471ffd3f039a0b8c65156df387f14d73782df1ab169b92658b06bdf9aa43ce40f483f4d25f03a44078e8a00ed081eb4b4572003c062658531fdd491aace74ba884dbad42b443346cda454d61351037d2aa4f6225ea55a3231c6c883a1d13f4332ee07481641da6a7a9c20f129c283345", @ANYRESDEC=0x0], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='qnx4\x00', 0x8, &(0x7f0000000180)='@&\xd1\x00') mount(&(0x7f00000001c0)=@md0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='iso9660\x00', 0x29dd9a18fdfb5dc4, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x1c2, 0xc3) mount$bind(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0), 0x13a80a3, 0x0) [ 93.576864][ C0] scsi_io_completion_action: 93 callbacks suppressed [ 93.576899][ C0] sd 0:0:1:0: [sda] tag#812 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 93.593922][ C0] sd 0:0:1:0: [sda] tag#812 CDB: opcode=0xe5 (vendor) [ 93.600730][ C0] sd 0:0:1:0: [sda] tag#812 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 93.610262][ C0] sd 0:0:1:0: [sda] tag#812 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 93.619751][ C0] sd 0:0:1:0: [sda] tag#812 CDB[20]: ba [ 93.636021][ T4529] ================================================================== [ 93.644143][ T4529] BUG: KCSAN: data-race in list_lru_add / list_lru_count_node [ 93.651625][ T4529] [ 93.653950][ T4529] write to 0xffff888102fbfca8 of 8 bytes by task 1819 on cpu 1: [ 93.661580][ T4529] list_lru_add+0x251/0x280 [ 93.666088][ T4529] retain_dentry+0x226/0x260 [ 93.670709][ T4529] dput+0x11e/0x430 [ 93.674519][ T4529] do_unlinkat+0x2a8/0x540 [ 93.678942][ T4529] __x64_sys_unlink+0x2c/0x30 12:22:44 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2e2f03ef64e3ff94b0d1d5f9dc51540787c2104197ff265ffe4f05d2b1d5e02d7b3a32"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/50, 0x32) (async) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="4454ee158e80f60520aa6e0c2a73d2daabbdeefc6967a5f3682267b6dcda9de4d277abfb6005b5b7293002e21c1f4e21358796186edae12baf002dccd71da75c62c60b10d6e66f2dae2776ae4c4a6f1720cc8b5ebee67c20309713dc23f1d0e929df929b58e76d4272da420f51a1d8332d27471ffd3f039a0b8c65156df387f14d73782df1ab169b92658b06bdf9aa43ce40f483f4d25f03a44078e8a00ed081eb4b4572003c062658531fdd491aace74ba884dbad42b443346cda454d61351037d2aa4f6225ea55a3231c6c883a1d13f4332ee07481641da6a7a9c20f129c283345", @ANYRESDEC=0x0], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='qnx4\x00', 0x8, &(0x7f0000000180)='@&\xd1\x00') mount(&(0x7f00000001c0)=@md0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='iso9660\x00', 0x29dd9a18fdfb5dc4, 0x0) (async) openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x1c2, 0xc3) (async) mount$bind(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0), 0x13a80a3, 0x0) [ 93.683625][ T4529] do_syscall_64+0x44/0xd0 [ 93.688050][ T4529] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 93.693985][ T4529] [ 93.696311][ T4529] read to 0xffff888102fbfca8 of 8 bytes by task 4529 on cpu 0: [ 93.703869][ T4529] list_lru_count_node+0x28/0x30 [ 93.708986][ T4529] shrink_dcache_sb+0x1ed/0x2d0 [ 93.713847][ T4529] reconfigure_super+0x146/0x540 [ 93.718793][ T4529] path_mount+0x13f9/0x1c40 [ 93.723296][ T4529] __se_sys_mount+0x24b/0x2f0 [ 93.727987][ T4529] __x64_sys_mount+0x63/0x70 12:22:44 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2e2f03ef64e3ff94b0d1d5f9dc51540787c2104197ff265ffe4f05d2b1d5e02d7b3a32"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async, rerun: 64) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/50, 0x32) (async, rerun: 64) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="4454ee158e80f60520aa6e0c2a73d2daabbdeefc6967a5f3682267b6dcda9de4d277abfb6005b5b7293002e21c1f4e21358796186edae12baf002dccd71da75c62c60b10d6e66f2dae2776ae4c4a6f1720cc8b5ebee67c20309713dc23f1d0e929df929b58e76d4272da420f51a1d8332d27471ffd3f039a0b8c65156df387f14d73782df1ab169b92658b06bdf9aa43ce40f483f4d25f03a44078e8a00ed081eb4b4572003c062658531fdd491aace74ba884dbad42b443346cda454d61351037d2aa4f6225ea55a3231c6c883a1d13f4332ee07481641da6a7a9c20f129c283345", @ANYRESDEC=0x0], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='qnx4\x00', 0x8, &(0x7f0000000180)='@&\xd1\x00') (async, rerun: 64) mount(&(0x7f00000001c0)=@md0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='iso9660\x00', 0x29dd9a18fdfb5dc4, 0x0) (async, rerun: 64) openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x1c2, 0xc3) (async) mount$bind(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0), 0x13a80a3, 0x0) 12:22:44 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) link(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) [ 93.732686][ T4529] do_syscall_64+0x44/0xd0 [ 93.737459][ T4529] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 93.743364][ T4529] [ 93.745711][ T4529] value changed: 0x0000000000000000 -> 0x0000000000000001 [ 93.752830][ T4529] [ 93.755152][ T4529] Reported by Kernel Concurrency Sanitizer on: [ 93.761310][ T4529] CPU: 0 PID: 4529 Comm: syz-executor.1 Not tainted 5.16.0-syzkaller #0 [ 93.769646][ T4529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 12:22:44 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x22000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x700, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x18000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) [ 93.779700][ T4529] ================================================================== 12:22:44 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) link(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) 12:22:44 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) link(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) link(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async) 12:22:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1800, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x22000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x26000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x18000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x26000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) [ 93.828129][ C1] sd 0:0:1:0: [sda] tag#813 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 93.838428][ C1] sd 0:0:1:0: [sda] tag#813 CDB: opcode=0xe5 (vendor) [ 93.845199][ C1] sd 0:0:1:0: [sda] tag#813 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 93.854699][ C1] sd 0:0:1:0: [sda] tag#813 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 93.864273][ C1] sd 0:0:1:0: [sda] tag#813 CDB[20]: ba 12:22:44 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2200, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890c, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @private=0xa010102}, @generic={0x0, "c9f82881cf2383c34673609a3c75"}, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}, 0xf0f4, 0x0, 0x0, 0x0, 0xfffc, &(0x7f0000000240)='syz_tun\x00'}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r1, 0x890c, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @broadcast}, @generic={0x0, "c9f82881052383c346b83c7500"}, @nl=@unspec, 0xf0f4, 0x0, 0x0, 0x0, 0xfffc, &(0x7f0000000240)='syz_tun\x00', 0x2}) mount(&(0x7f00000001c0)=ANY=[@ANYRES16=r1], &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='hpfs\x00', 0x0, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="2f6465762f6c6f6f70300049be1a7108ab3420acf68ce91b1cf4e04dc9f30dc49200e5b2ca122cbd9f775d6f1dfabe4842e622e5467e6c6fca8934d6e750ffe3235292b72b51cc"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='jffs2\x00', 0x20, &(0x7f0000000180)='\x00') getsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000300)=""/140, &(0x7f00000003c0)=0x8c) 12:22:44 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x22000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000300)=ANY=[]) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:44 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2600, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x26000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x40000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x40000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f00, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890c, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @private=0xa010102}, @generic={0x0, "c9f82881cf2383c34673609a3c75"}, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}, 0xf0f4, 0x0, 0x0, 0x0, 0xfffc, &(0x7f0000000240)='syz_tun\x00'}) (async) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r1, 0x890c, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @broadcast}, @generic={0x0, "c9f82881052383c346b83c7500"}, @nl=@unspec, 0xf0f4, 0x0, 0x0, 0x0, 0xfffc, &(0x7f0000000240)='syz_tun\x00', 0x2}) (async) mount(&(0x7f00000001c0)=ANY=[@ANYRES16=r1], &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='hpfs\x00', 0x0, 0x0) (async) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="2f6465762f6c6f6f70300049be1a7108ab3420acf68ce91b1cf4e04dc9f30dc49200e5b2ca122cbd9f775d6f1dfabe4842e622e5467e6c6fca8934d6e750ffe3235292b72b51cc"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='jffs2\x00', 0x20, &(0x7f0000000180)='\x00') (async) getsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000300)=""/140, &(0x7f00000003c0)=0x8c) 12:22:44 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x46000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) [ 93.964158][ C0] sd 0:0:1:0: [sda] tag#814 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 93.974497][ C0] sd 0:0:1:0: [sda] tag#814 CDB: opcode=0xe5 (vendor) [ 93.981295][ C0] sd 0:0:1:0: [sda] tag#814 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 93.990804][ C0] sd 0:0:1:0: [sda] tag#814 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 94.000313][ C0] sd 0:0:1:0: [sda] tag#814 CDB[20]: ba 12:22:44 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:44 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x46000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x40000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4600, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890c, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @private=0xa010102}, @generic={0x0, "c9f82881cf2383c34673609a3c75"}, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}, 0xf0f4, 0x0, 0x0, 0x0, 0xfffc, &(0x7f0000000240)='syz_tun\x00'}) (async, rerun: 32) r1 = socket$inet_tcp(0x2, 0x1, 0x0) (rerun: 32) ioctl$sock_SIOCADDRT(r1, 0x890c, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @broadcast}, @generic={0x0, "c9f82881052383c346b83c7500"}, @nl=@unspec, 0xf0f4, 0x0, 0x0, 0x0, 0xfffc, &(0x7f0000000240)='syz_tun\x00', 0x2}) (async, rerun: 32) mount(&(0x7f00000001c0)=ANY=[@ANYRES16=r1], &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='hpfs\x00', 0x0, 0x0) (rerun: 32) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="2f6465762f6c6f6f70300049be1a7108ab3420acf68ce91b1cf4e04dc9f30dc49200e5b2ca122cbd9f775d6f1dfabe4842e622e5467e6c6fca8934d6e750ffe3235292b72b51cc"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='jffs2\x00', 0x20, &(0x7f0000000180)='\x00') (async) getsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000300)=""/140, &(0x7f00000003c0)=0x8c) [ 94.072681][ C1] sd 0:0:1:0: [sda] tag#815 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 94.082994][ C1] sd 0:0:1:0: [sda] tag#815 CDB: opcode=0xe5 (vendor) [ 94.089799][ C1] sd 0:0:1:0: [sda] tag#815 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 94.099298][ C1] sd 0:0:1:0: [sda] tag#815 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 94.108799][ C1] sd 0:0:1:0: [sda] tag#815 CDB[20]: ba 12:22:44 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x46000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:44 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:45 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf9fdffff, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf9fdffff, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) [ 94.203252][ C0] sd 0:0:1:0: [sda] tag#816 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 94.213581][ C0] sd 0:0:1:0: [sda] tag#816 CDB: opcode=0xe5 (vendor) [ 94.220476][ C0] sd 0:0:1:0: [sda] tag#816 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 94.229983][ C0] sd 0:0:1:0: [sda] tag#816 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 94.239483][ C0] sd 0:0:1:0: [sda] tag#816 CDB[20]: ba 12:22:45 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) [ 94.308281][ C0] sd 0:0:1:0: [sda] tag#817 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 94.318588][ C0] sd 0:0:1:0: [sda] tag#817 CDB: opcode=0xe5 (vendor) [ 94.325357][ C0] sd 0:0:1:0: [sda] tag#817 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 94.334872][ C0] sd 0:0:1:0: [sda] tag#817 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 94.344376][ C0] sd 0:0:1:0: [sda] tag#817 CDB[20]: ba 12:22:45 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="9caf742eca947a0b4bb7f8209d8b244a19022211dc9d33a9a970a030861a558a8755c498e0c44f309f9b7af6506dd725e9d86cdb75e2895a8c10976233bbd1d64eeae094ef6bc6a4e1b20e2e1866dc430f468a0620e239f5dd9d28007d03c379ea25332ec4c0cd5bd4fd0d15000eae15c2394a1c424cca69096bd098fdb80e99107f5f1eb5393b281b51da8650a33954ecafc170baa09120058fd62f89746686da6e491c3143d90f0c161257b1a6cf88f253b34d7a2415542291bbf06c9740e7dc773a4d4de77dd609cc6df8de3a9c5d9298b3618428a850d61ed84cd9aad7691656aa51a0", 0xe5, 0x7}], 0x80, &(0x7f0000000300)={[{'\\-/),*\\-$}\''}, {}, {'iso9660\x00'}], [{@hash}, {@appraise_type}, {@context={'context', 0x3d, 'staff_u'}}]}) 12:22:45 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:45 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffdf9, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffdf9, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf9fdffff, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) [ 94.545796][ C1] sd 0:0:1:0: [sda] tag#818 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 94.549965][ T4702] nfs4: Unknown parameter '\-/)' [ 94.556091][ C1] sd 0:0:1:0: [sda] tag#818 CDB: opcode=0xe5 (vendor) [ 94.556111][ C1] sd 0:0:1:0: [sda] tag#818 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 94.577353][ C1] sd 0:0:1:0: [sda] tag#818 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 94.586841][ C1] sd 0:0:1:0: [sda] tag#818 CDB[20]: ba 12:22:45 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async, rerun: 32) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (rerun: 32) syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="9caf742eca947a0b4bb7f8209d8b244a19022211dc9d33a9a970a030861a558a8755c498e0c44f309f9b7af6506dd725e9d86cdb75e2895a8c10976233bbd1d64eeae094ef6bc6a4e1b20e2e1866dc430f468a0620e239f5dd9d28007d03c379ea25332ec4c0cd5bd4fd0d15000eae15c2394a1c424cca69096bd098fdb80e99107f5f1eb5393b281b51da8650a33954ecafc170baa09120058fd62f89746686da6e491c3143d90f0c161257b1a6cf88f253b34d7a2415542291bbf06c9740e7dc773a4d4de77dd609cc6df8de3a9c5d9298b3618428a850d61ed84cd9aad7691656aa51a0", 0xe5, 0x7}], 0x80, &(0x7f0000000300)={[{'\\-/),*\\-$}\''}, {}, {'iso9660\x00'}], [{@hash}, {@appraise_type}, {@context={'context', 0x3d, 'staff_u'}}]}) 12:22:45 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:45 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffdf9, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) [ 94.621576][ C0] sd 0:0:1:0: [sda] tag#819 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 94.631894][ C0] sd 0:0:1:0: [sda] tag#819 CDB: opcode=0xe5 (vendor) [ 94.638683][ C0] sd 0:0:1:0: [sda] tag#819 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 94.648166][ C0] sd 0:0:1:0: [sda] tag#819 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 94.657822][ C0] sd 0:0:1:0: [sda] tag#819 CDB[20]: ba 12:22:45 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x18000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:45 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) [ 94.705343][ C1] sd 0:0:1:0: [sda] tag#820 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 94.715723][ C1] sd 0:0:1:0: [sda] tag#820 CDB: opcode=0xe5 (vendor) [ 94.722499][ C1] sd 0:0:1:0: [sda] tag#820 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 94.731978][ C1] sd 0:0:1:0: [sda] tag#820 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 94.732581][ T4727] nfs4: Unknown parameter '\-/)' [ 94.741447][ C1] sd 0:0:1:0: [sda] tag#820 CDB[20]: ba [ 94.798243][ C0] sd 0:0:1:0: [sda] tag#821 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 94.808554][ C0] sd 0:0:1:0: [sda] tag#821 CDB: opcode=0xe5 (vendor) [ 94.815335][ C0] sd 0:0:1:0: [sda] tag#821 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 94.824828][ C0] sd 0:0:1:0: [sda] tag#821 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 94.834314][ C0] sd 0:0:1:0: [sda] tag#821 CDB[20]: ba 12:22:45 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async) syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="9caf742eca947a0b4bb7f8209d8b244a19022211dc9d33a9a970a030861a558a8755c498e0c44f309f9b7af6506dd725e9d86cdb75e2895a8c10976233bbd1d64eeae094ef6bc6a4e1b20e2e1866dc430f468a0620e239f5dd9d28007d03c379ea25332ec4c0cd5bd4fd0d15000eae15c2394a1c424cca69096bd098fdb80e99107f5f1eb5393b281b51da8650a33954ecafc170baa09120058fd62f89746686da6e491c3143d90f0c161257b1a6cf88f253b34d7a2415542291bbf06c9740e7dc773a4d4de77dd609cc6df8de3a9c5d9298b3618428a850d61ed84cd9aad7691656aa51a0", 0xe5, 0x7}], 0x80, &(0x7f0000000300)={[{'\\-/),*\\-$}\''}, {}, {'iso9660\x00'}], [{@hash}, {@appraise_type}, {@context={'context', 0x3d, 'staff_u'}}]}) 12:22:45 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x22000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:45 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x26000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:45 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) [ 94.931505][ T4753] nfs4: Unknown parameter '\-/)' 12:22:45 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890c, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @private=0xa010102}, @generic={0x0, "c9f82881cf2383c34673609a3c75"}, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}, 0xf0f4, 0x0, 0x0, 0x0, 0xfffc, &(0x7f0000000240)='syz_tun\x00', 0x0, 0xfffffffffffffffc}) mount(&(0x7f00000000c0)=ANY=[@ANYRESHEX=r0], &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) 12:22:45 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:45 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x40000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890c, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @private=0xa010102}, @generic={0x0, "c9f82881cf2383c34673609a3c75"}, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}, 0xf0f4, 0x0, 0x0, 0x0, 0xfffc, &(0x7f0000000240)='syz_tun\x00', 0x0, 0xfffffffffffffffc}) (async) mount(&(0x7f00000000c0)=ANY=[@ANYRESHEX=r0], &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) 12:22:45 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:45 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x46000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890c, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @private=0xa010102}, @generic={0x0, "c9f82881cf2383c34673609a3c75"}, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}, 0xf0f4, 0x0, 0x0, 0x0, 0xfffc, &(0x7f0000000240)='syz_tun\x00', 0x0, 0xfffffffffffffffc}) (async) mount(&(0x7f00000000c0)=ANY=[@ANYRESHEX=r0], &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) 12:22:45 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="00d20000766a0000ebfc4ddd24bac1d71e4a0902de7395ec603e074a21a3e2cdf92b3bd4ee454b75a861b71ba048f26726e32f59ffcb317b089d2733276445e0b8343610b26a80b94c492ceb7a1915f7dcc4f43526b1f905074e0782e3b637798c258981bba13928cbca4dcb0d7701cc48f5c1a4f1dc2a9a4aaaa4925e2f65924a897dc3e9c86889771d165302035b5903db087d265c1165f05760fa2e3a4fb484d783bbd46bbb8be75a73f5d43099de2269380b4205620dff6b0afb2d14d8f4f71e7e3fb1c52151d05ee4d91ee3b929f15858def4c9f362a115d8337fcedd2c2863dd901e2f053b698601b8ebb6592d4900953041df9fe881caa9a9b1f02d6afc6281aeead1f4e037ebf201a673b39aa17b6a2be02ef7ad41220538341f942ea4467fb7c2d00f87e8f15ba2c33fce0b2498866ae7834b0c730f28fcf3a715a3e44c178d35eb28c5196deb04428bcfe2750c187f"]) 12:22:45 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:45 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:46 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:46 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:46 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000240)='./file0/../file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) chdir(&(0x7f0000000200)='./file0\x00') mount(&(0x7f0000000040)=@sg0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='ext4\x00', 0x3040008, &(0x7f0000000180)='\x00') 12:22:46 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:46 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:46 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:46 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf9fdffff, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:46 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000240)='./file0/../file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async) chdir(&(0x7f0000000200)='./file0\x00') mount(&(0x7f0000000040)=@sg0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='ext4\x00', 0x3040008, &(0x7f0000000180)='\x00') 12:22:46 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:46 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:46 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:46 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:46 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) (async) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./f'], &(0x7f0000000240)='./file0/../file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) chdir(&(0x7f0000000200)='./file0\x00') (async) mount(&(0x7f0000000040)=@sg0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='ext4\x00', 0x3040008, &(0x7f0000000180)='\x00') 12:22:46 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:46 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:46 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:46 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffdf9, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:46 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1800000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:46 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="4181d27ad59fd3bbdcbc569be78feaa1d99e99049277e13fd3e06017d0baf7ff52940ad663c87d0a0687ef8fa5d8561cce4c1d3c1a26af439f9bdf3e8804fe8b06089f1a6e763c342ce4047b1748ab5a9916cca69f53ba97bd93c074737230ef6199b7a5801dcc6a14d13b1afcee31955e97d7bd0fd7731ef5835721b00fce9464b70a56", 0x84, 0x260048c1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)=0x2000000) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)) close(r0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="95ded1ec29752d81d01e7bc1192b3d2e2f660000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 12:22:46 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:46 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:46 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2200000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:46 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000001a240)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "23cc9bcea5f644"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000000840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x42}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00'}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010102}, 0x10, 0x0}}], 0x1, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x170) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) readlink(0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') pread64(r10, &(0x7f0000001240)=""/102400, 0x200000, 0x0) dup3(0xffffffffffffffff, r3, 0xd2b417466c8a139e) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[@ANYBLOB="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"]) 12:22:46 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1800000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:46 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1800000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:46 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:46 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2200000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:46 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="4181d27ad59fd3bbdcbc569be78feaa1d99e99049277e13fd3e06017d0baf7ff52940ad663c87d0a0687ef8fa5d8561cce4c1d3c1a26af439f9bdf3e8804fe8b06089f1a6e763c342ce4047b1748ab5a9916cca69f53ba97bd93c074737230ef6199b7a5801dcc6a14d13b1afcee31955e97d7bd0fd7731ef5835721b00fce9464b70a56", 0x84, 0x260048c1, 0x0, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) (async) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)=0x2000000) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)) (async) close(r0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="95ded1ec29752d81d01e7bc1192b3d2e2f660000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') [ 95.418463][ T4852] EXT4-fs warning (device sda1): verify_group_input:137: Cannot add at group 0 (only 8 groups) 12:22:46 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2600000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:46 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="4181d27ad59fd3bbdcbc569be78feaa1d99e99049277e13fd3e06017d0baf7ff52940ad663c87d0a0687ef8fa5d8561cce4c1d3c1a26af439f9bdf3e8804fe8b06089f1a6e763c342ce4047b1748ab5a9916cca69f53ba97bd93c074737230ef6199b7a5801dcc6a14d13b1afcee31955e97d7bd0fd7731ef5835721b00fce9464b70a56", 0x84, 0x260048c1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)=0x2000000) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)) close(r0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="95ded1ec29752d81d01e7bc1192b3d2e2f660000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="4181d27ad59fd3bbdcbc569be78feaa1d99e99049277e13fd3e06017d0baf7ff52940ad663c87d0a0687ef8fa5d8561cce4c1d3c1a26af439f9bdf3e8804fe8b06089f1a6e763c342ce4047b1748ab5a9916cca69f53ba97bd93c074737230ef6199b7a5801dcc6a14d13b1afcee31955e97d7bd0fd7731ef5835721b00fce9464b70a56", 0x84, 0x260048c1, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) (async) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)=0x2000000) (async) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)) (async) close(r0) (async) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="95ded1ec29752d81d01e7bc1192b3d2e2f660000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') (async) 12:22:46 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) [ 95.486049][ T4864] EXT4-fs: 194 callbacks suppressed [ 95.486064][ T4864] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 95.502281][ T4866] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 95.508961][ T4867] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 95.515267][ T4869] EXT4-fs (sda1): re-mounted. Quota mode: none. [ 95.521769][ T4861] EXT4-fs (sda1): re-mounted. Quota mode: none. 12:22:46 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2081090, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2600000000000000, 0x0, 0x0, 0x1c4a6, &(0x7f000001b240)=ANY=[]) 12:22:46 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0