Warning: Permanently added '[localhost]:63923' (ECDSA) to the list of known hosts. 2022/09/20 11:15:33 fuzzer started 2022/09/20 11:15:33 dialing manager at localhost:34957 syzkaller login: [ 40.965628] cgroup: Unknown subsys name 'net' [ 41.072323] cgroup: Unknown subsys name 'rlimit' 2022/09/20 11:15:46 syscalls: 2215 2022/09/20 11:15:46 code coverage: enabled 2022/09/20 11:15:46 comparison tracing: enabled 2022/09/20 11:15:46 extra coverage: enabled 2022/09/20 11:15:46 setuid sandbox: enabled 2022/09/20 11:15:46 namespace sandbox: enabled 2022/09/20 11:15:46 Android sandbox: enabled 2022/09/20 11:15:46 fault injection: enabled 2022/09/20 11:15:46 leak checking: enabled 2022/09/20 11:15:46 net packet injection: enabled 2022/09/20 11:15:46 net device setup: enabled 2022/09/20 11:15:46 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/20 11:15:46 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/20 11:15:46 USB emulation: enabled 2022/09/20 11:15:46 hci packet injection: enabled 2022/09/20 11:15:46 wifi device emulation: failed to parse kernel version (6.0.0-rc6-next-20220920) 2022/09/20 11:15:46 802.15.4 emulation: enabled 2022/09/20 11:15:46 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/20 11:15:47 fetching corpus: 46, signal 26345/28731 (executing program) 2022/09/20 11:15:47 fetching corpus: 96, signal 43248/45291 (executing program) 2022/09/20 11:15:47 fetching corpus: 145, signal 47652/49828 (executing program) 2022/09/20 11:15:47 fetching corpus: 195, signal 56289/57628 (executing program) 2022/09/20 11:15:47 fetching corpus: 234, signal 62556/63077 (executing program) 2022/09/20 11:15:47 fetching corpus: 234, signal 62556/63157 (executing program) 2022/09/20 11:15:47 fetching corpus: 234, signal 62556/63228 (executing program) 2022/09/20 11:15:47 fetching corpus: 234, signal 62556/63328 (executing program) 2022/09/20 11:15:47 fetching corpus: 234, signal 62556/63417 (executing program) 2022/09/20 11:15:47 fetching corpus: 234, signal 62556/63494 (executing program) 2022/09/20 11:15:47 fetching corpus: 234, signal 62556/63588 (executing program) 2022/09/20 11:15:47 fetching corpus: 234, signal 62556/63665 (executing program) 2022/09/20 11:15:47 fetching corpus: 234, signal 62556/63747 (executing program) 2022/09/20 11:15:47 fetching corpus: 234, signal 62556/63828 (executing program) 2022/09/20 11:15:47 fetching corpus: 234, signal 62556/63905 (executing program) 2022/09/20 11:15:47 fetching corpus: 234, signal 62556/63974 (executing program) 2022/09/20 11:15:47 fetching corpus: 234, signal 62556/64059 (executing program) 2022/09/20 11:15:48 fetching corpus: 234, signal 62556/64142 (executing program) 2022/09/20 11:15:48 fetching corpus: 234, signal 62556/64233 (executing program) 2022/09/20 11:15:48 fetching corpus: 234, signal 62556/64317 (executing program) 2022/09/20 11:15:48 fetching corpus: 234, signal 62556/64403 (executing program) 2022/09/20 11:15:48 fetching corpus: 234, signal 62556/64485 (executing program) 2022/09/20 11:15:48 fetching corpus: 234, signal 62556/64559 (executing program) 2022/09/20 11:15:48 fetching corpus: 234, signal 62556/64628 (executing program) 2022/09/20 11:15:48 fetching corpus: 234, signal 62556/64704 (executing program) 2022/09/20 11:15:48 fetching corpus: 234, signal 62556/64783 (executing program) 2022/09/20 11:15:48 fetching corpus: 234, signal 62556/64853 (executing program) 2022/09/20 11:15:48 fetching corpus: 234, signal 62556/64926 (executing program) 2022/09/20 11:15:48 fetching corpus: 234, signal 62556/65014 (executing program) 2022/09/20 11:15:48 fetching corpus: 234, signal 62556/65089 (executing program) 2022/09/20 11:15:48 fetching corpus: 234, signal 62556/65149 (executing program) 2022/09/20 11:15:48 fetching corpus: 234, signal 62556/65149 (executing program) 2022/09/20 11:15:50 starting 8 fuzzer processes 11:15:50 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 11:15:50 executing program 0: socket(0x1f, 0x0, 0x0) 11:15:50 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x14, 0x0, &(0x7f00000000c0)={0x2, 0x4e24, @local}, 0x10) [ 58.054020] audit: type=1400 audit(1663672550.932:6): avc: denied { execmem } for pid=286 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 11:15:50 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 11:15:50 executing program 4: prctl$PR_SET_KEEPCAPS(0x8, 0x1) wait4(0x0, &(0x7f0000000000), 0x8, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000100)) prctl$PR_SET_KEEPCAPS(0x8, 0x1) read$usbmon(0xffffffffffffffff, &(0x7f0000000140)=""/34, 0x22) prctl$PR_SET_KEEPCAPS(0x8, 0x1) fork() 11:15:50 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f00000000c0)) 11:15:50 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 11:15:50 executing program 7: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, "e22407bd38361279b0a2d210b7ebf08e29e6b0"}) [ 59.405880] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 59.408884] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 59.410553] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 59.414569] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 59.416400] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 59.418703] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 59.428519] Bluetooth: hci0: HCI_REQ-0x0c1a [ 59.468402] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 59.472114] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 59.474212] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 59.483345] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 59.486369] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 59.487990] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 59.490809] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 59.491800] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 59.493613] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 59.494775] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 59.496846] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 59.498496] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 59.500409] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 59.502637] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 59.503972] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 59.523393] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 59.528289] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 59.532769] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 59.535785] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 59.537641] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 59.538889] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 59.540930] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 59.542245] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 59.543313] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 59.546028] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 59.548505] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 59.550780] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 59.553294] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 59.554396] Bluetooth: hci3: HCI_REQ-0x0c1a [ 59.554731] Bluetooth: hci2: HCI_REQ-0x0c1a [ 59.560563] Bluetooth: hci5: HCI_REQ-0x0c1a [ 59.578800] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 59.579973] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 59.581427] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 59.582492] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 59.583913] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 59.588162] Bluetooth: hci1: HCI_REQ-0x0c1a [ 59.597892] Bluetooth: hci4: HCI_REQ-0x0c1a [ 59.601403] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 59.612013] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 59.614378] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 59.616214] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 59.620815] Bluetooth: hci6: HCI_REQ-0x0c1a [ 59.658753] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 59.694926] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 59.712697] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 59.733667] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 59.736777] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 59.754893] Bluetooth: hci7: HCI_REQ-0x0c1a [ 61.492984] Bluetooth: hci0: command 0x0409 tx timeout [ 61.619649] Bluetooth: hci4: command 0x0409 tx timeout [ 61.619697] Bluetooth: hci3: command 0x0409 tx timeout [ 61.620975] Bluetooth: hci1: command 0x0409 tx timeout [ 61.621839] Bluetooth: hci5: command 0x0409 tx timeout [ 61.622891] Bluetooth: hci2: command 0x0409 tx timeout [ 61.683542] Bluetooth: hci6: command 0x0409 tx timeout [ 61.811651] Bluetooth: hci7: command 0x0409 tx timeout [ 63.540618] Bluetooth: hci0: command 0x041b tx timeout [ 63.667713] Bluetooth: hci5: command 0x041b tx timeout [ 63.667746] Bluetooth: hci1: command 0x041b tx timeout [ 63.668545] Bluetooth: hci3: command 0x041b tx timeout [ 63.668987] Bluetooth: hci4: command 0x041b tx timeout [ 63.669763] Bluetooth: hci2: command 0x041b tx timeout [ 63.732507] Bluetooth: hci6: command 0x041b tx timeout [ 63.860573] Bluetooth: hci7: command 0x041b tx timeout [ 65.587649] Bluetooth: hci0: command 0x040f tx timeout [ 65.715612] Bluetooth: hci4: command 0x040f tx timeout [ 65.716384] Bluetooth: hci3: command 0x040f tx timeout [ 65.717609] Bluetooth: hci2: command 0x040f tx timeout [ 65.718330] Bluetooth: hci1: command 0x040f tx timeout [ 65.719071] Bluetooth: hci5: command 0x040f tx timeout [ 65.779508] Bluetooth: hci6: command 0x040f tx timeout [ 65.907524] Bluetooth: hci7: command 0x040f tx timeout [ 67.635607] Bluetooth: hci0: command 0x0419 tx timeout [ 67.763583] Bluetooth: hci5: command 0x0419 tx timeout [ 67.764337] Bluetooth: hci1: command 0x0419 tx timeout [ 67.765075] Bluetooth: hci2: command 0x0419 tx timeout [ 67.765774] Bluetooth: hci3: command 0x0419 tx timeout [ 67.766503] Bluetooth: hci4: command 0x0419 tx timeout [ 67.827735] Bluetooth: hci6: command 0x0419 tx timeout [ 67.955571] Bluetooth: hci7: command 0x0419 tx timeout 11:16:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x14, 0x0, &(0x7f00000000c0)={0x2, 0x4e24, @local}, 0x10) 11:16:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x14, 0x0, &(0x7f00000000c0)={0x2, 0x4e24, @local}, 0x10) 11:16:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x14, 0x0, &(0x7f00000000c0)={0x2, 0x4e24, @local}, 0x10) 11:16:45 executing program 2: prctl$PR_SET_TIMERSLACK(0x1d, 0x40) 11:16:45 executing program 2: prctl$PR_SET_TIMERSLACK(0x1d, 0x40) 11:16:45 executing program 2: prctl$PR_SET_TIMERSLACK(0x1d, 0x40) 11:16:45 executing program 2: prctl$PR_SET_TIMERSLACK(0x1d, 0x40) 11:16:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="580000000001010400000000000000000a000000440001802c000180140003002001000000000000000000000000000014000400ff0200000000000000000000000000010c000280040001"], 0x58}}, 0x0) [ 113.054825] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 113.055657] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 113.407136] audit: type=1400 audit(1663672606.285:7): avc: denied { open } for pid=3890 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 114.133061] audit: type=1400 audit(1663672607.011:8): avc: denied { kernel } for pid=3931 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 114.149011] ------------[ cut here ]------------ [ 114.149033] [ 114.149036] ====================================================== [ 114.149040] WARNING: possible circular locking dependency detected [ 114.149044] 6.0.0-rc6-next-20220920 #1 Not tainted [ 114.149050] ------------------------------------------------------ [ 114.149054] syz-executor.1/3934 is trying to acquire lock: [ 114.149060] ffffffff853faab8 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 114.149099] [ 114.149099] but task is already holding lock: [ 114.149102] ffff88800dec9820 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 114.149130] [ 114.149130] which lock already depends on the new lock. [ 114.149130] [ 114.149133] [ 114.149133] the existing dependency chain (in reverse order) is: [ 114.149137] [ 114.149137] -> #3 (&ctx->lock){....}-{2:2}: [ 114.149150] _raw_spin_lock+0x2a/0x40 [ 114.149170] __perf_event_task_sched_out+0x53b/0x18d0 [ 114.149182] __schedule+0xedd/0x2470 [ 114.149196] schedule+0xda/0x1b0 [ 114.149207] exit_to_user_mode_prepare+0x114/0x1a0 [ 114.149219] syscall_exit_to_user_mode+0x19/0x40 [ 114.149231] do_syscall_64+0x48/0x90 [ 114.149247] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 114.149266] [ 114.149266] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 114.149280] _raw_spin_lock_nested+0x30/0x40 [ 114.149297] raw_spin_rq_lock_nested+0x1e/0x30 [ 114.149310] task_fork_fair+0x63/0x4d0 [ 114.149327] sched_cgroup_fork+0x3d0/0x540 [ 114.149341] copy_process+0x4183/0x6e20 [ 114.149351] kernel_clone+0xe7/0x890 [ 114.149361] user_mode_thread+0xad/0xf0 [ 114.149371] rest_init+0x24/0x250 [ 114.149381] arch_call_rest_init+0xf/0x14 [ 114.149397] start_kernel+0x4c1/0x4e6 [ 114.149409] secondary_startup_64_no_verify+0xe0/0xeb [ 114.149426] [ 114.149426] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 114.149440] _raw_spin_lock_irqsave+0x39/0x60 [ 114.149457] try_to_wake_up+0xab/0x1930 [ 114.149470] up+0x75/0xb0 [ 114.149481] __up_console_sem+0x6e/0x80 [ 114.149497] console_unlock+0x46a/0x590 [ 114.149513] do_con_write+0xc05/0x1d50 [ 114.149525] con_write+0x21/0x40 [ 114.149535] n_tty_write+0x4d4/0xfe0 [ 114.149548] file_tty_write.constprop.0+0x49c/0x8f0 [ 114.149561] vfs_write+0x9c3/0xd90 [ 114.149579] ksys_write+0x127/0x250 [ 114.149596] do_syscall_64+0x3b/0x90 [ 114.149611] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 114.149630] [ 114.149630] -> #0 ((console_sem).lock){....}-{2:2}: [ 114.149644] __lock_acquire+0x2a02/0x5e70 [ 114.149660] lock_acquire+0x1a2/0x530 [ 114.149676] _raw_spin_lock_irqsave+0x39/0x60 [ 114.149692] down_trylock+0xe/0x70 [ 114.149705] __down_trylock_console_sem+0x3b/0xd0 [ 114.149721] vprintk_emit+0x16b/0x560 [ 114.149737] vprintk+0x84/0xa0 [ 114.149753] _printk+0xba/0xf1 [ 114.149763] report_bug.cold+0x72/0xab [ 114.149779] handle_bug+0x3c/0x70 [ 114.149793] exc_invalid_op+0x14/0x50 [ 114.149809] asm_exc_invalid_op+0x16/0x20 [ 114.149819] group_sched_out.part.0+0x2c7/0x460 [ 114.149830] ctx_sched_out+0x8f1/0xc10 [ 114.149840] __perf_event_task_sched_out+0x6d0/0x18d0 [ 114.149853] __schedule+0xedd/0x2470 [ 114.149865] schedule+0xda/0x1b0 [ 114.149876] exit_to_user_mode_prepare+0x114/0x1a0 [ 114.149887] syscall_exit_to_user_mode+0x19/0x40 [ 114.149898] do_syscall_64+0x48/0x90 [ 114.149913] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 114.149932] [ 114.149932] other info that might help us debug this: [ 114.149932] [ 114.149935] Chain exists of: [ 114.149935] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 114.149935] [ 114.149949] Possible unsafe locking scenario: [ 114.149949] [ 114.149952] CPU0 CPU1 [ 114.149954] ---- ---- [ 114.149957] lock(&ctx->lock); [ 114.149962] lock(&rq->__lock); [ 114.149969] lock(&ctx->lock); [ 114.149975] lock((console_sem).lock); [ 114.149981] [ 114.149981] *** DEADLOCK *** [ 114.149981] [ 114.149983] 2 locks held by syz-executor.1/3934: [ 114.149990] #0: ffff88806cf37d18 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 114.150017] #1: ffff88800dec9820 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 114.150045] [ 114.150045] stack backtrace: [ 114.150048] CPU: 1 PID: 3934 Comm: syz-executor.1 Not tainted 6.0.0-rc6-next-20220920 #1 [ 114.150061] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 114.150069] Call Trace: [ 114.150072] [ 114.150076] dump_stack_lvl+0x8b/0xb3 [ 114.150093] check_noncircular+0x263/0x2e0 [ 114.150109] ? format_decode+0x26c/0xb50 [ 114.150126] ? print_circular_bug+0x450/0x450 [ 114.150142] ? enable_ptr_key_workfn+0x20/0x20 [ 114.150158] ? format_decode+0x26c/0xb50 [ 114.150174] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 114.150191] __lock_acquire+0x2a02/0x5e70 [ 114.150213] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 114.150235] lock_acquire+0x1a2/0x530 [ 114.150251] ? down_trylock+0xe/0x70 [ 114.150266] ? lock_release+0x750/0x750 [ 114.150286] ? vprintk+0x84/0xa0 [ 114.150304] _raw_spin_lock_irqsave+0x39/0x60 [ 114.150321] ? down_trylock+0xe/0x70 [ 114.150334] down_trylock+0xe/0x70 [ 114.150348] ? vprintk+0x84/0xa0 [ 114.150364] __down_trylock_console_sem+0x3b/0xd0 [ 114.150381] vprintk_emit+0x16b/0x560 [ 114.150400] vprintk+0x84/0xa0 [ 114.150417] _printk+0xba/0xf1 [ 114.150427] ? record_print_text.cold+0x16/0x16 [ 114.150442] ? report_bug.cold+0x66/0xab [ 114.150458] ? group_sched_out.part.0+0x2c7/0x460 [ 114.150470] report_bug.cold+0x72/0xab [ 114.150487] handle_bug+0x3c/0x70 [ 114.150503] exc_invalid_op+0x14/0x50 [ 114.150519] asm_exc_invalid_op+0x16/0x20 [ 114.150530] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 114.150543] Code: 5e 41 5f e9 9b b9 ef ff e8 96 b9 ef ff 65 8b 1d 0b 13 ac 7e 31 ff 89 de e8 36 b6 ef ff 85 db 0f 84 8a 00 00 00 e8 79 b9 ef ff <0f> 0b e9 a5 fe ff ff e8 6d b9 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 114.150555] RSP: 0018:ffff88803ce37c48 EFLAGS: 00010006 [ 114.150564] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 114.150572] RDX: ffff88803b9b3580 RSI: ffffffff815662c7 RDI: 0000000000000005 [ 114.150580] RBP: ffff88803ce38000 R08: 0000000000000005 R09: 0000000000000001 [ 114.150587] R10: 0000000000000000 R11: ffffffff865ae05b R12: ffff88800dec9800 [ 114.150595] R13: ffff88806cf3d140 R14: ffffffff8547cec0 R15: 0000000000000002 [ 114.150606] ? group_sched_out.part.0+0x2c7/0x460 [ 114.150619] ? group_sched_out.part.0+0x2c7/0x460 [ 114.150632] ctx_sched_out+0x8f1/0xc10 [ 114.150645] __perf_event_task_sched_out+0x6d0/0x18d0 [ 114.150661] ? lock_is_held_type+0xd7/0x130 [ 114.150673] ? __perf_cgroup_move+0x160/0x160 [ 114.150685] ? set_next_entity+0x304/0x550 [ 114.150702] ? update_curr+0x267/0x740 [ 114.150720] ? lock_is_held_type+0xd7/0x130 [ 114.150732] __schedule+0xedd/0x2470 [ 114.150748] ? io_schedule_timeout+0x150/0x150 [ 114.150763] ? rcu_read_lock_sched_held+0x3e/0x80 [ 114.150783] schedule+0xda/0x1b0 [ 114.150797] exit_to_user_mode_prepare+0x114/0x1a0 [ 114.150809] syscall_exit_to_user_mode+0x19/0x40 [ 114.150821] do_syscall_64+0x48/0x90 [ 114.150837] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 114.150856] RIP: 0033:0x7f0b83362b19 [ 114.150864] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 114.150876] RSP: 002b:00007f0b808d8218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 114.150886] RAX: 0000000000000001 RBX: 00007f0b83475f68 RCX: 00007f0b83362b19 [ 114.150894] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f0b83475f6c [ 114.150901] RBP: 00007f0b83475f60 R08: 000000000000000e R09: 0000000000000000 [ 114.150908] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f0b83475f6c [ 114.150915] R13: 00007ffe3c71aacf R14: 00007f0b808d8300 R15: 0000000000022000 [ 114.150928] [ 114.208147] WARNING: CPU: 1 PID: 3934 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 114.208831] Modules linked in: [ 114.209072] CPU: 1 PID: 3934 Comm: syz-executor.1 Not tainted 6.0.0-rc6-next-20220920 #1 [ 114.209680] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 114.210509] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 114.210908] Code: 5e 41 5f e9 9b b9 ef ff e8 96 b9 ef ff 65 8b 1d 0b 13 ac 7e 31 ff 89 de e8 36 b6 ef ff 85 db 0f 84 8a 00 00 00 e8 79 b9 ef ff <0f> 0b e9 a5 fe ff ff e8 6d b9 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 114.212241] RSP: 0018:ffff88803ce37c48 EFLAGS: 00010006 [ 114.212634] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 114.213160] RDX: ffff88803b9b3580 RSI: ffffffff815662c7 RDI: 0000000000000005 [ 114.213676] RBP: ffff88803ce38000 R08: 0000000000000005 R09: 0000000000000001 [ 114.214190] R10: 0000000000000000 R11: ffffffff865ae05b R12: ffff88800dec9800 [ 114.214712] R13: ffff88806cf3d140 R14: ffffffff8547cec0 R15: 0000000000000002 [ 114.215252] FS: 00007f0b808d8700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 114.215855] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 114.216294] CR2: 0000001b2e223000 CR3: 000000003c6ac000 CR4: 0000000000350ee0 [ 114.216813] Call Trace: [ 114.217009] [ 114.217180] ctx_sched_out+0x8f1/0xc10 [ 114.217476] __perf_event_task_sched_out+0x6d0/0x18d0 [ 114.217858] ? lock_is_held_type+0xd7/0x130 [ 114.218185] ? __perf_cgroup_move+0x160/0x160 [ 114.218525] ? set_next_entity+0x304/0x550 [ 114.218887] ? update_curr+0x267/0x740 [ 114.219208] ? lock_is_held_type+0xd7/0x130 [ 114.219537] __schedule+0xedd/0x2470 [ 114.219828] ? io_schedule_timeout+0x150/0x150 [ 114.220185] ? rcu_read_lock_sched_held+0x3e/0x80 [ 114.220548] schedule+0xda/0x1b0 [ 114.220806] exit_to_user_mode_prepare+0x114/0x1a0 [ 114.221180] syscall_exit_to_user_mode+0x19/0x40 [ 114.221537] do_syscall_64+0x48/0x90 [ 114.221824] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 114.222217] RIP: 0033:0x7f0b83362b19 [ 114.222503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 114.223831] RSP: 002b:00007f0b808d8218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 114.224387] RAX: 0000000000000001 RBX: 00007f0b83475f68 RCX: 00007f0b83362b19 [ 114.224901] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f0b83475f6c [ 114.225425] RBP: 00007f0b83475f60 R08: 000000000000000e R09: 0000000000000000 [ 114.225948] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f0b83475f6c [ 114.226478] R13: 00007ffe3c71aacf R14: 00007f0b808d8300 R15: 0000000000022000 [ 114.227008] [ 114.227187] irq event stamp: 732 [ 114.227431] hardirqs last enabled at (731): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 114.228122] hardirqs last disabled at (732): [] __schedule+0x1225/0x2470 [ 114.228727] softirqs last enabled at (402): [] __irq_exit_rcu+0x11b/0x180 [ 114.229356] softirqs last disabled at (149): [] __irq_exit_rcu+0x11b/0x180 [ 114.229974] ---[ end trace 0000000000000000 ]--- [ 114.341134] capability: warning: `syz-executor.1' uses deprecated v2 capabilities in a way that may be insecure [ 114.350972] 9pnet_fd: p9_fd_create_tcp (3934): problem connecting socket to 127.0.0.1 [ 114.401741] 9pnet_fd: p9_fd_create_tcp (3942): problem connecting socket to 127.0.0.1 [ 114.973449] hrtimer: interrupt took 18675 ns 11:16:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="580000000001010400000000000000000a000000440001802c000180140003002001000000000000000000000000000014000400ff0200000000000000000000000000010c000280040001"], 0x58}}, 0x0) 11:16:48 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 11:16:48 executing program 4: prctl$PR_SET_KEEPCAPS(0x8, 0x1) wait4(0x0, &(0x7f0000000000), 0x8, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000100)) prctl$PR_SET_KEEPCAPS(0x8, 0x1) read$usbmon(0xffffffffffffffff, &(0x7f0000000140)=""/34, 0x22) prctl$PR_SET_KEEPCAPS(0x8, 0x1) fork() 11:16:48 executing program 0: socket(0x1f, 0x0, 0x0) 11:16:48 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) 11:16:48 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f00000000c0)) 11:16:48 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 11:16:48 executing program 7: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, "e22407bd38361279b0a2d210b7ebf08e29e6b0"}) [ 115.353557] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 115.354292] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 11:16:48 executing program 0: socket(0x1f, 0x0, 0x0) 11:16:48 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) [ 115.676665] 9pnet_fd: p9_fd_create_tcp (3995): problem connecting socket to 127.0.0.1 11:16:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="580000000001010400000000000000000a000000440001802c000180140003002001000000000000000000000000000014000400ff0200000000000000000000000000010c000280040001"], 0x58}}, 0x0) 11:16:49 executing program 7: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, "e22407bd38361279b0a2d210b7ebf08e29e6b0"}) 11:16:49 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f00000000c0)) 11:16:49 executing program 0: socket(0x1f, 0x0, 0x0) 11:16:49 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) 11:16:49 executing program 4: prctl$PR_SET_KEEPCAPS(0x8, 0x1) wait4(0x0, &(0x7f0000000000), 0x8, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000100)) prctl$PR_SET_KEEPCAPS(0x8, 0x1) read$usbmon(0xffffffffffffffff, &(0x7f0000000140)=""/34, 0x22) prctl$PR_SET_KEEPCAPS(0x8, 0x1) fork() 11:16:49 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 11:16:49 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') [ 116.842897] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 116.843889] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 11:16:49 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f00000000c0)) 11:16:49 executing program 7: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, "e22407bd38361279b0a2d210b7ebf08e29e6b0"}) 11:16:49 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 11:16:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="580000000001010400000000000000000a000000440001802c000180140003002001000000000000000000000000000014000400ff0200000000000000000000000000010c000280040001"], 0x58}}, 0x0) 11:16:49 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) 11:16:49 executing program 4: prctl$PR_SET_KEEPCAPS(0x8, 0x1) wait4(0x0, &(0x7f0000000000), 0x8, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000100)) prctl$PR_SET_KEEPCAPS(0x8, 0x1) read$usbmon(0xffffffffffffffff, &(0x7f0000000140)=""/34, 0x22) prctl$PR_SET_KEEPCAPS(0x8, 0x1) fork() [ 116.965134] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 11:16:49 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) [ 116.966013] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 11:16:49 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 11:16:49 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 11:16:50 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') [ 117.134340] 9pnet_fd: p9_fd_create_tcp (4027): problem connecting socket to 127.0.0.1 11:16:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) [ 117.155281] 9pnet_fd: p9_fd_create_tcp (4014): problem connecting socket to 127.0.0.1 [ 117.176221] 9pnet_fd: p9_fd_create_tcp (4031): problem connecting socket to 127.0.0.1 11:16:50 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 11:16:50 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) [ 117.209524] 9pnet_fd: p9_fd_create_tcp (4024): problem connecting socket to 127.0.0.1 [ 117.217512] 9pnet_fd: p9_fd_create_tcp (4034): problem connecting socket to 127.0.0.1 11:16:50 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) [ 117.324409] 9pnet_fd: p9_fd_create_tcp (4050): problem connecting socket to 127.0.0.1 [ 117.333963] 9pnet_fd: p9_fd_create_tcp (4044): problem connecting socket to 127.0.0.1 [ 117.361664] 9pnet_fd: p9_fd_create_tcp (4052): problem connecting socket to 127.0.0.1 [ 117.398697] 9pnet_fd: p9_fd_create_tcp (4055): problem connecting socket to 127.0.0.1 11:16:50 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 11:16:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 11:16:50 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 11:16:50 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 11:16:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 11:16:50 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 11:16:50 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 11:16:50 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) [ 117.585342] 9pnet_fd: p9_fd_create_tcp (4073): problem connecting socket to 127.0.0.1 [ 117.588829] 9pnet_fd: p9_fd_create_tcp (4071): problem connecting socket to 127.0.0.1 [ 117.589524] 9pnet_fd: p9_fd_create_tcp (4067): problem connecting socket to 127.0.0.1 [ 117.593561] 9pnet_fd: p9_fd_create_tcp (4065): problem connecting socket to 127.0.0.1 [ 117.597353] 9pnet_fd: p9_fd_create_tcp (4074): problem connecting socket to 127.0.0.1 [ 117.606096] 9pnet_fd: p9_fd_create_tcp (4077): problem connecting socket to 127.0.0.1 11:16:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 11:16:50 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 11:16:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 11:16:50 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 11:16:50 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 11:16:50 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) [ 117.699788] 9pnet_fd: p9_fd_create_tcp (4079): problem connecting socket to 127.0.0.1 [ 117.712706] 9pnet_fd: p9_fd_create_tcp (4076): problem connecting socket to 127.0.0.1 [ 117.741720] 9pnet_fd: p9_fd_create_tcp (4097): problem connecting socket to 127.0.0.1 [ 117.806751] 9pnet_fd: p9_fd_create_tcp (4103): problem connecting socket to 127.0.0.1 [ 117.845210] 9pnet_fd: p9_fd_create_tcp (4118): problem connecting socket to 127.0.0.1 [ 117.884515] 9pnet_fd: p9_fd_create_tcp (4108): problem connecting socket to 127.0.0.1 [ 117.890510] 9pnet_fd: p9_fd_create_tcp (4106): problem connecting socket to 127.0.0.1 [ 117.919111] 9pnet_fd: p9_fd_create_tcp (4104): problem connecting socket to 127.0.0.1 11:16:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 11:16:50 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 11:16:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 11:16:50 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 11:16:50 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 11:16:50 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 11:16:50 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') [ 118.132767] 9pnet_fd: p9_fd_create_tcp (4139): problem connecting socket to 127.0.0.1 [ 118.148902] 9pnet_fd: p9_fd_create_tcp (4125): problem connecting socket to 127.0.0.1 [ 118.156777] 9pnet_fd: p9_fd_create_tcp (4128): problem connecting socket to 127.0.0.1 [ 118.190513] 9pnet_fd: p9_fd_create_tcp (4132): problem connecting socket to 127.0.0.1 11:16:51 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 11:16:51 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 11:16:51 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 11:16:51 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 11:16:51 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 11:16:51 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 11:16:51 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 11:16:51 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 11:16:51 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') [ 118.508189] 9pnet_fd: p9_fd_create_tcp (4152): problem connecting socket to 127.0.0.1 [ 118.511588] 9pnet_fd: p9_fd_create_tcp (4156): problem connecting socket to 127.0.0.1 [ 118.530956] 9pnet_fd: p9_fd_create_tcp (4170): problem connecting socket to 127.0.0.1 11:16:51 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 11:16:51 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 11:16:51 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 11:16:51 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 11:16:51 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 11:16:51 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 11:16:51 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 11:16:51 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x4, 0x5, 0x88, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4a1, 0x2, @perf_config_ext={0x9, 0xe2a}, 0x43004, 0x0, 0x2, 0x5, 0x1ff, 0x5, 0x3, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x27) tkill(r1, 0x16) capset(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000040)={0xfffffffc, 0x0, 0x1, 0x0, 0x4, 0x1}) ptrace(0x11, r1) ptrace$setopts(0x4206, r1, 0x0, 0x100034) ptrace(0x11, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x20, 0x400c8c0}, 0x44494) mount$9p_tcp(&(0x7f0000000000), &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x8, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid}, {@afid={'afid', 0x3d, 0x4}}, {@access_user}], [{@obj_type={'obj_type', 0x3d, '/proc/locks\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) [ 118.765388] 9pnet_fd: p9_fd_create_tcp (4173): problem connecting socket to 127.0.0.1 11:16:51 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 11:16:51 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') [ 118.860288] 9pnet_fd: p9_fd_create_tcp (4189): problem connecting socket to 127.0.0.1 11:16:51 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 11:16:51 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 11:16:52 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 11:16:52 executing program 4: prctl$PR_SET_KEEPCAPS(0x8, 0x1) wait4(0x0, &(0x7f0000000000), 0x8, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000100)) prctl$PR_SET_KEEPCAPS(0x8, 0x1) read$usbmon(0xffffffffffffffff, &(0x7f0000000140)=""/34, 0x22) prctl$PR_SET_KEEPCAPS(0x8, 0x1) fork() 11:16:52 executing program 1: prctl$PR_SET_KEEPCAPS(0x8, 0x1) wait4(0x0, &(0x7f0000000000), 0x8, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000100)) prctl$PR_SET_KEEPCAPS(0x8, 0x1) read$usbmon(0xffffffffffffffff, &(0x7f0000000140)=""/34, 0x22) prctl$PR_SET_KEEPCAPS(0x8, 0x1) fork() 11:16:52 executing program 2: prctl$PR_SET_KEEPCAPS(0x8, 0x1) wait4(0x0, &(0x7f0000000000), 0x8, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000100)) prctl$PR_SET_KEEPCAPS(0x8, 0x1) read$usbmon(0xffffffffffffffff, &(0x7f0000000140)=""/34, 0x22) prctl$PR_SET_KEEPCAPS(0x8, 0x1) fork() 11:16:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 11:16:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 11:16:52 executing program 0: prctl$PR_SET_KEEPCAPS(0x8, 0x1) wait4(0x0, &(0x7f0000000000), 0x8, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000100)) prctl$PR_SET_KEEPCAPS(0x8, 0x1) read$usbmon(0xffffffffffffffff, &(0x7f0000000140)=""/34, 0x22) prctl$PR_SET_KEEPCAPS(0x8, 0x1) fork() 11:16:52 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, "e22407bd38361279b0a2d210b7ebf08e29e6b0"}) 11:16:52 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, "e22407bd38361279b0a2d210b7ebf08e29e6b0"}) 11:16:52 executing program 2: prctl$PR_SET_KEEPCAPS(0x8, 0x1) wait4(0x0, &(0x7f0000000000), 0x8, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000100)) prctl$PR_SET_KEEPCAPS(0x8, 0x1) read$usbmon(0xffffffffffffffff, &(0x7f0000000140)=""/34, 0x22) prctl$PR_SET_KEEPCAPS(0x8, 0x1) fork() 11:16:52 executing program 4: prctl$PR_SET_KEEPCAPS(0x8, 0x1) wait4(0x0, &(0x7f0000000000), 0x8, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000100)) prctl$PR_SET_KEEPCAPS(0x8, 0x1) read$usbmon(0xffffffffffffffff, &(0x7f0000000140)=""/34, 0x22) prctl$PR_SET_KEEPCAPS(0x8, 0x1) fork() 11:16:52 executing program 1: prctl$PR_SET_KEEPCAPS(0x8, 0x1) wait4(0x0, &(0x7f0000000000), 0x8, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000100)) prctl$PR_SET_KEEPCAPS(0x8, 0x1) read$usbmon(0xffffffffffffffff, &(0x7f0000000140)=""/34, 0x22) prctl$PR_SET_KEEPCAPS(0x8, 0x1) fork() 11:16:52 executing program 0: prctl$PR_SET_KEEPCAPS(0x8, 0x1) wait4(0x0, &(0x7f0000000000), 0x8, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000100)) prctl$PR_SET_KEEPCAPS(0x8, 0x1) read$usbmon(0xffffffffffffffff, &(0x7f0000000140)=""/34, 0x22) prctl$PR_SET_KEEPCAPS(0x8, 0x1) fork() 11:16:52 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, "e22407bd38361279b0a2d210b7ebf08e29e6b0"}) 11:16:52 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 11:16:52 executing program 2: prctl$PR_SET_KEEPCAPS(0x8, 0x1) wait4(0x0, &(0x7f0000000000), 0x8, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000100)) prctl$PR_SET_KEEPCAPS(0x8, 0x1) read$usbmon(0xffffffffffffffff, &(0x7f0000000140)=""/34, 0x22) prctl$PR_SET_KEEPCAPS(0x8, 0x1) fork() 11:16:52 executing program 4: prctl$PR_SET_KEEPCAPS(0x8, 0x1) wait4(0x0, &(0x7f0000000000), 0x8, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000100)) prctl$PR_SET_KEEPCAPS(0x8, 0x1) read$usbmon(0xffffffffffffffff, &(0x7f0000000140)=""/34, 0x22) prctl$PR_SET_KEEPCAPS(0x8, 0x1) fork() 11:16:52 executing program 1: prctl$PR_SET_KEEPCAPS(0x8, 0x1) wait4(0x0, &(0x7f0000000000), 0x8, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000100)) prctl$PR_SET_KEEPCAPS(0x8, 0x1) read$usbmon(0xffffffffffffffff, &(0x7f0000000140)=""/34, 0x22) prctl$PR_SET_KEEPCAPS(0x8, 0x1) fork() 11:16:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r1 = gettid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="20002773a500fedbff2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) r3 = getpgid(0x0) ptrace(0x8, r3) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) getpgid(r1) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 11:16:52 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000140)={@local, @dev, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "b0e0ee", 0x8, 0x2c, 0x0, @private0, @mcast2 VM DIAGNOSIS: 11:16:47 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=ffff88801afef358 RCX=0000000000000000 RDX=1ffff110035fde6b RSI=ffff88801afefd68 RDI=ffff88801afef358 RBP=ffff88801afef3f0 RSP=ffff88801afef340 R8 =ffffffff85ecd0a2 R9 =ffffffff85ecd0a6 R10=ffffed10035fde78 R11=ffff88801afef398 R12=ffff88801afef420 R13=0000000000000000 R14=ffff88800df65040 R15=ffff888008b1c400 RIP=ffffffff8111af9a RFL=00000212 [----A--] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f65576da260 CR3=000000003aea8000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 756e696c2d34365f 3638782f62696c2f YMM01=0000000000000000 0000000000000000 2e6f747079726362 696c2f756e672d78 YMM02=0000000000000000 0000000000000000 00312e312e6f732e 6f74707972636269 YMM03=0000000000000000 0000000000000000 6c2f756e672d7875 6e696c2d34365f36 YMM04=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000074 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b1551 RDI=ffffffff87643ba0 RBP=ffffffff87643b60 RSP=ffff88803ce37698 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000074 R11=0000000000000001 R12=0000000000000074 R13=ffffffff87643b60 R14=0000000000000010 R15=ffffffff822b1540 RIP=ffffffff822b15a9 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f0b808d8700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b2e223000 CR3=000000003c6ac000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f0b834497c0 00007f0b834497c8 YMM02=0000000000000000 0000000000000000 00007f0b834497e0 00007f0b834497c0 YMM03=0000000000000000 0000000000000000 00007f0b834497c8 00007f0b834497c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000