}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:36:27 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x0, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:36:27 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1745.054675] 9pnet: p9_fd_create_tcp (10175): problem connecting socket to 127.0.0.1 18:36:27 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0x0, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1745.078352] 9pnet: p9_fd_create_tcp (10179): problem connecting socket to 127.0.0.1 [ 1745.101747] 9pnet: p9_fd_create_tcp (10181): problem connecting socket to 127.0.0.1 18:36:27 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x0, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1745.149941] 9pnet: Insufficient options for proto=fd [ 1745.300726] 9pnet: p9_fd_create_tcp (10196): problem connecting socket to 127.0.0.1 [ 1745.315970] 9pnet: p9_fd_create_tcp (10197): problem connecting socket to 127.0.0.1 18:36:40 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0x0, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:36:40 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x0, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:36:40 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/103, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:36:40 executing program 3: r0 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000001880)={[{@fat=@debug}]}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)=0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x4300, 0x4) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x11, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x3}, 0x200000}], 0x7ffff000, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000002ec0)={0x3, 0x80, 0x3f, 0x3c, 0x5, 0x40, 0x0, 0x487, 0x20000, 0xa, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000002e80), 0x8}, 0x800, 0x1, 0x7, 0x5, 0x1, 0x2, 0x8001, 0x0, 0x1, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000002f40), 0x183242, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002f80), 0x480, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0x1) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000000)=0x4300, 0x4) fchmod(0xffffffffffffffff, 0x180) sendmmsg$inet6(r4, &(0x7f0000004d00)=[{{0x0, 0x11, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x3}, 0x200000}], 0x7ffff000, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$int_in(r5, 0x5452, &(0x7f0000000040)=0x1) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000000)=0x4300, 0x4) sendmmsg$inet6(r5, &(0x7f0000004d00)=[{{0x0, 0x11, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x3}, 0x200000}], 0x7ffff000, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003100)=[{{&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001680)=[{&(0x7f00000001c0)="a7e95198fe408514d944e0e60637c77a86634023016e267888abda7ff23d48d9c0ee0fc3ce3e0f2373b268605ef3deb3e487b4021913106e5b773509e9a9680c35df72a01b2abc63baa5f0e6ed262962db19c6469a794b614db5357032502a33afe2dd56b0909b3026812ff4a3278fd4293a5bc3d3c3f9526ca13de61e89d5921199754c96d13b5f6db533839d76c30263de1797543262dae99815592b7904a4ef08d04a92dede0ec1752473a768187c18de57d826a6f5c8f88d129452bd5e4cb1b8dcb1cd8d865537ad81d38deb2313d1116cb794713cc90b51f4269d66159662", 0xe1}, {&(0x7f00000002c0)="a7bcfd391f8c28ca049cb5ae7ed0207856e45b4127c38c1b2bd607c3ade3458acaa175ad38bc3c73a5c98dc6a52bf6730ac78c130ad658fcea840074fcb9fa0fa71d78f4608777c31d8b9fd3b81aa6965ec57621c6e9f62e7fb8b6805723d1337b34880bebfa43918b16e6876c4d05a35c6c6adc92dd", 0x76}, {&(0x7f0000000340)="06ab7fbaad640655b4819528628c5159325403fd37c68c05e2229c0d236bf24f394b758e1d8c25b2cf9c29aa8e06139884c5b318931cfcd04e5db330ecacda0795d3bb69276457e3662e86946964db20dbf59e83f9d51bb6b9de4fc0d488ede4b2bfafbed9e1f0b62a6b37e87c0b64d529a3e8d3e6d0cb5b10eb896c5bce49ead0608380f14d5d98c0846b3f36a953b787b0475699104257ed9fc316593cae0841531884a1", 0xa5}, {&(0x7f0000000400)="1ec05b7e07340a16b68f2d0594917c43925c7ffe40e2b8aaa2283cf38c1d5eaf145e4d9cb6821cb30080ffa8cbc8d6d67e88ad80c5f28760804342", 0x3b}, {&(0x7f0000000440)="079ea327bb8a48ef2ee23189aff25b1cdcd07d7fc3ce9274bd0e23f88e70bee504e4e180442172c4ffbf6c8032e3fbd165757c2c094002e27e8fa20c15f20dfb95cb1406954f7683cae52dec30fd4220a539c23df7a1df97f0bd0190fa928a3337268db2185821d3990131f8aed4306dfed12ec77b3bcada962c4a0fa481604f85ac51ea05d0efc82b147487e8ea199cb5b4b07dd7d826632aedaabcb5824833679d976f583fa0df6bbfaed3", 0xac}, {&(0x7f0000000500)="89a28ffa9b6e035590d5ccbb2c9f5026e4a32135fb60383bcce31720bd6cf7db7a68ca31e6b9e9909c87c7740240e5e1455f0ac9e8942c7f1370a4cdb5fa4d6044b1d0ebdd699f90dc2082c996e279a0417093d4b8a839a98ff724152fc113658e02ebfae54f7e16641b05eaf5379238e5e67d462ab8800a051a879bea9dba6732f0cb70f48b1a796eae83bfe07debde0a7983ed708d91b8", 0x98}, {&(0x7f00000005c0)="2e76c42f99a3595b4236", 0xa}, {&(0x7f0000000600)="a403829cae4454ce769bdac1ce28f2e5712306a388fd47982e90a4916944f651a978a0acb1b35c3936c2b352c3f0dec81b34c8814e0ddc48ed5468cfeef7293ce2186560ea", 0x45}, {&(0x7f0000000680)="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", 0x1000}], 0x9, &(0x7f00000017c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}], 0x40, 0x24000080}}, {{0x0, 0x0, &(0x7f0000002c40)=[{&(0x7f00000018c0)="c776b0ac06038238b9c6c492ea70b6d1db930c4347c2dd3e5225d54ce9cdfd89440d69401d5a579e31dd7caea411fd229f581f19236f88dec897135c67eb68d29553b303845d048685cc5b0648a2871d5b7bcddf6f261f3718d0863ca772c147830d2cdfb77caebc0bf7c77e9dfc956b2f7c41cf89ebe5828dd4d2807843bf489063d834e23773cb5b3f2b7caa295c4241a128e3cef566e0c3dc72bcf6788e6babebb79b51099661b8d24885e1dca9ecf6363d08aace82221629c75f1bd6ec5030c43260af996a9fb273813947deabf57a", 0xd1}, {&(0x7f0000001800)="4fe05a1b08c920e7d4e6311a5189b4cddc4bebbc6c3eaf7e6e", 0x19}, {&(0x7f00000019c0)="602aebfa89cd20cfb14a6861cd1e39a0c33599907327ee25078e213c6e300617753cfd00f0272626316e6beac7bf735f1c7d091a38a9dfcd13d1a2a8d6f88d5132d3add17795542d8199778c21825d7d33fceccb6e2351c25bb9f7f8798767aa430c1804635ac87256d8d3f9eb99b36f120904c8706db8abde1fac0521365fe633fe29d9f6b9a4ca9e254324d72430adaebc5e99ca26a08f73434ca3394fac30b07d5e07e680ef4bdc4f68506b8d18070d", 0xb1}, {&(0x7f0000001a80)="c7a786f4ef73820dc885b2525e04131271b62345ee78eb3369e582e27db084e5221102cc7d8fed04b1feaf15162f4a79acedd0622a160b7df6b85ede156c7d5ad39758e00f192a118134611be127b07e171b6ba2bf1cc24c485e92b4687a7f61576c000dd9f00bded1d475b91e5c010184d8f953542624c1a3bd257b1c3cd09c9cba5c7ac42c2088dff2fb765e547cfb99dbc164fbf33c92d71189c9415bc5ff9001db0d2f69abd2f46f25d8b1642f79328df750c0cfa716541b582e21f4b91f07e69382381b6abd6aa26a8f031e4d4b8a4eab0bd1b46c96d31ebfa3f49c3e46334d58d5a81ad3e836d447cf06ced58108", 0xf1}, {&(0x7f0000001b80)="2786a0b38ea12241836480e265ea0775173756b0f3f2ab7482db96a017e6de9ec575b02a8089cc355f8ae3ca8f20722e3db5f68930ff50b15fbf800dd008948fa14f10664770464078ef642cb11fb92ca15592b6a752faa07f3e504b4f3a771bbd81d5208910a00c07", 0x69}, {&(0x7f0000001840)="87", 0x1}, {&(0x7f0000001c00)="7408a1a329f24b88eba5822a30d98e1636a14f26b4be25a57e50bdb19aee77abc6d55f6c", 0x24}, {&(0x7f0000001c40)="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", 0x1000}], 0x8, &(0x7f0000002cc0)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYRES32, @ANYBLOB="1c001001000000", @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYBLOB="000000003000fe00000000200100000001000000c931a917d6f48656dca5557107a37bd2f8f62ea14aa5a38ba39db5c0987e4525ad9b6ea8c30bb8244c2e922a1ffa723e0bcb7bd8a515d8aa1ebc86302b665cff06c0d69feb01e0380fab1b693c6fd33b432a8401e4218ea6428610bc3ee84fbdd21237e8c263ab2d05b7cf60dc37e77646b3446d1e6ff2be4d5a43f3292cf84b278cbcdd8a9542dea1db29f99a9132ac3501f4eef8", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYRES32, @ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000000018000000000000000100000001f64000", @ANYRES32, @ANYRES32, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3, @ANYRES16=r5, @ANYRES32=r0, @ANYRES32=r4, @ANYRES32=r0, @ANYRES32=r5], 0x108, 0x2400c014}}], 0x2, 0x24000851) 18:36:40 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x30, 0x0, 0x0, 0x2e) 18:36:40 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), 0x0, &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:36:40 executing program 1: ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)={0xfffffffffffffffc, 0x100000000}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x15b2, 0x6}}, './file0\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='ramfs\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000740)=[{&(0x7f0000000200)="0c7932d6b01caaa024fb2c75f73e035e995b97e86468b8c9b08464f264de624fbd785463719342ffbb4a1b", 0x2b, 0x40}, {&(0x7f00000002c0)="ac341d2da5d10edf0ccb16e79aae55cd8c6aa00ff6fbb196c18b3c58abc6bd8d6af6fc127c4578bbab8460e5166b8138694e96c85fed444c043f4d4857bbde133e5282babb6d763d4b491d2de20b3ccbd421b8c0f06f556c804301bb0708a7c446540f25be58f1fbc29a996ee52707d948", 0x71, 0x7}, {&(0x7f0000000340)="30c35841254797386b6f08695f6286a65b496ddb212450a0ab395a20b9ae00cfbcfbee59723f8db6302365ba0d3de3996d2666d859ae6cb84a5b118adf6a203f2c18d9d8f94d4b50d2c011f2eb43c60c29641f05e2527157ba8e4a7f7b59fe00da5441d22846f36fa9d5e48c4c8562163a671367c2e207d50c67740cf2009d688be1d4bfdac74b1309db2514f177ca3fb707020b8fd56c754752ce7468d21944144469fcd7f08acc8fd2ce398e32", 0xae, 0x401}, {&(0x7f00000004c0)="54cd27965c896deaebd159960a675b665263f7179d94a22bf26e039da5b04295f08b3693563d12f5a12e9a937cb098e0f75722eeeb6f975eec816274e068447158ec4420e3be5dfad4f47555", 0x4c, 0xffff}, {&(0x7f0000000640)="799794cc37646967fa55a15c28d2c1487b79eb58aae70ac7433e39efecbd7ee342785526b1d6b89cd0f96a11205acea0ea62ae5c6b213325c8d23401eae52829e709ca57e34179150d48786c34fe6c58ef376f8c17ae864e9c2ffabb8f24664068effddc60facff961fce7db4a6bdbf7998101f43bbae68745508d7740", 0x7d, 0x3}, {&(0x7f00000006c0)="30cd364e7a11f4b82fe91d3c934be75aa99358f9e5a370a6e7ab0fdcf749adeb56c7b403e19f5017bd288883a7a9cccc7702e89d5c0da2215992376c7f689b", 0x3f, 0x100}], 0x0, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000d40)={'macvlan1\x00'}) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x40, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) move_mount(r3, &(0x7f0000000380)='./file0\x00', r0, &(0x7f00000003c0)='./file1\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x2, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r1}}, {@posixacl}, {@loose}, {@version_u}, {@dfltgid={'dfltgid', 0x3d, r2}}, {@version_9p2000}], [{@fowner_eq}, {@dont_hash}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@smackfshat={'smackfshat', 0x3d, '\',\'A'}}, {@seclabel}, {@pcr={'pcr', 0x3d, 0x33}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@appraise}]}}) chown(&(0x7f0000000000)='./file0\x00', 0x0, r1) r4 = creat(&(0x7f0000001680)='./file0/file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000d18000000", @ANYRES32, @ANYBLOB="ff7f0000000000002e2f66696c653000"]) pwrite64(r4, &(0x7f0000000140)="b2", 0x20000141, 0x8001) 18:36:40 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1758.718891] FAT-fs (loop3): bogus number of reserved sectors [ 1758.718972] 9pnet: p9_fd_create_tcp (10214): problem connecting socket to 127.0.0.1 [ 1758.719658] FAT-fs (loop3): Can't find a valid FAT filesystem [ 1758.742768] 9pnet: p9_fd_create_tcp (10210): problem connecting socket to 127.0.0.1 18:36:41 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x0, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1758.753334] 9pnet: p9_fd_create_tcp (10220): problem connecting socket to 127.0.0.1 18:36:41 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), 0x0, &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1758.805917] SELinux: duplicate or incompatible mount options 18:36:41 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1758.952303] 9pnet: p9_fd_create_tcp (10236): problem connecting socket to 127.0.0.1 [ 1758.961263] 9pnet: p9_fd_create_tcp (10234): problem connecting socket to 127.0.0.1 [ 1759.213917] SELinux: duplicate or incompatible mount options [ 1759.350483] FAT-fs (loop3): bogus number of reserved sectors [ 1759.351830] FAT-fs (loop3): Can't find a valid FAT filesystem 18:36:57 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), 0x0, &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:36:57 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:36:57 executing program 3: r0 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000001880)={[{@fat=@debug}]}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)=0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x4300, 0x4) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x11, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x3}, 0x200000}], 0x7ffff000, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000002ec0)={0x3, 0x80, 0x3f, 0x3c, 0x5, 0x40, 0x0, 0x487, 0x20000, 0xa, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000002e80), 0x8}, 0x800, 0x1, 0x7, 0x5, 0x1, 0x2, 0x8001, 0x0, 0x1, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000002f40), 0x183242, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002f80), 0x480, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0x1) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000000)=0x4300, 0x4) fchmod(0xffffffffffffffff, 0x180) sendmmsg$inet6(r4, &(0x7f0000004d00)=[{{0x0, 0x11, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x3}, 0x200000}], 0x7ffff000, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$int_in(r5, 0x5452, &(0x7f0000000040)=0x1) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000000)=0x4300, 0x4) sendmmsg$inet6(r5, &(0x7f0000004d00)=[{{0x0, 0x11, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x3}, 0x200000}], 0x7ffff000, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003100)=[{{&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001680)=[{&(0x7f00000001c0)="a7e95198fe408514d944e0e60637c77a86634023016e267888abda7ff23d48d9c0ee0fc3ce3e0f2373b268605ef3deb3e487b4021913106e5b773509e9a9680c35df72a01b2abc63baa5f0e6ed262962db19c6469a794b614db5357032502a33afe2dd56b0909b3026812ff4a3278fd4293a5bc3d3c3f9526ca13de61e89d5921199754c96d13b5f6db533839d76c30263de1797543262dae99815592b7904a4ef08d04a92dede0ec1752473a768187c18de57d826a6f5c8f88d129452bd5e4cb1b8dcb1cd8d865537ad81d38deb2313d1116cb794713cc90b51f4269d66159662", 0xe1}, {&(0x7f00000002c0)="a7bcfd391f8c28ca049cb5ae7ed0207856e45b4127c38c1b2bd607c3ade3458acaa175ad38bc3c73a5c98dc6a52bf6730ac78c130ad658fcea840074fcb9fa0fa71d78f4608777c31d8b9fd3b81aa6965ec57621c6e9f62e7fb8b6805723d1337b34880bebfa43918b16e6876c4d05a35c6c6adc92dd", 0x76}, {&(0x7f0000000340)="06ab7fbaad640655b4819528628c5159325403fd37c68c05e2229c0d236bf24f394b758e1d8c25b2cf9c29aa8e06139884c5b318931cfcd04e5db330ecacda0795d3bb69276457e3662e86946964db20dbf59e83f9d51bb6b9de4fc0d488ede4b2bfafbed9e1f0b62a6b37e87c0b64d529a3e8d3e6d0cb5b10eb896c5bce49ead0608380f14d5d98c0846b3f36a953b787b0475699104257ed9fc316593cae0841531884a1", 0xa5}, {&(0x7f0000000400)="1ec05b7e07340a16b68f2d0594917c43925c7ffe40e2b8aaa2283cf38c1d5eaf145e4d9cb6821cb30080ffa8cbc8d6d67e88ad80c5f28760804342", 0x3b}, {&(0x7f0000000440)="079ea327bb8a48ef2ee23189aff25b1cdcd07d7fc3ce9274bd0e23f88e70bee504e4e180442172c4ffbf6c8032e3fbd165757c2c094002e27e8fa20c15f20dfb95cb1406954f7683cae52dec30fd4220a539c23df7a1df97f0bd0190fa928a3337268db2185821d3990131f8aed4306dfed12ec77b3bcada962c4a0fa481604f85ac51ea05d0efc82b147487e8ea199cb5b4b07dd7d826632aedaabcb5824833679d976f583fa0df6bbfaed3", 0xac}, {&(0x7f0000000500)="89a28ffa9b6e035590d5ccbb2c9f5026e4a32135fb60383bcce31720bd6cf7db7a68ca31e6b9e9909c87c7740240e5e1455f0ac9e8942c7f1370a4cdb5fa4d6044b1d0ebdd699f90dc2082c996e279a0417093d4b8a839a98ff724152fc113658e02ebfae54f7e16641b05eaf5379238e5e67d462ab8800a051a879bea9dba6732f0cb70f48b1a796eae83bfe07debde0a7983ed708d91b8", 0x98}, {&(0x7f00000005c0)="2e76c42f99a3595b4236", 0xa}, {&(0x7f0000000600)="a403829cae4454ce769bdac1ce28f2e5712306a388fd47982e90a4916944f651a978a0acb1b35c3936c2b352c3f0dec81b34c8814e0ddc48ed5468cfeef7293ce2186560ea", 0x45}, {&(0x7f0000000680)="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", 0x1000}], 0x9, &(0x7f00000017c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}], 0x40, 0x24000080}}, {{0x0, 0x0, &(0x7f0000002c40)=[{&(0x7f00000018c0)="c776b0ac06038238b9c6c492ea70b6d1db930c4347c2dd3e5225d54ce9cdfd89440d69401d5a579e31dd7caea411fd229f581f19236f88dec897135c67eb68d29553b303845d048685cc5b0648a2871d5b7bcddf6f261f3718d0863ca772c147830d2cdfb77caebc0bf7c77e9dfc956b2f7c41cf89ebe5828dd4d2807843bf489063d834e23773cb5b3f2b7caa295c4241a128e3cef566e0c3dc72bcf6788e6babebb79b51099661b8d24885e1dca9ecf6363d08aace82221629c75f1bd6ec5030c43260af996a9fb273813947deabf57a", 0xd1}, {&(0x7f0000001800)="4fe05a1b08c920e7d4e6311a5189b4cddc4bebbc6c3eaf7e6e", 0x19}, {&(0x7f00000019c0)="602aebfa89cd20cfb14a6861cd1e39a0c33599907327ee25078e213c6e300617753cfd00f0272626316e6beac7bf735f1c7d091a38a9dfcd13d1a2a8d6f88d5132d3add17795542d8199778c21825d7d33fceccb6e2351c25bb9f7f8798767aa430c1804635ac87256d8d3f9eb99b36f120904c8706db8abde1fac0521365fe633fe29d9f6b9a4ca9e254324d72430adaebc5e99ca26a08f73434ca3394fac30b07d5e07e680ef4bdc4f68506b8d18070d", 0xb1}, {&(0x7f0000001a80)="c7a786f4ef73820dc885b2525e04131271b62345ee78eb3369e582e27db084e5221102cc7d8fed04b1feaf15162f4a79acedd0622a160b7df6b85ede156c7d5ad39758e00f192a118134611be127b07e171b6ba2bf1cc24c485e92b4687a7f61576c000dd9f00bded1d475b91e5c010184d8f953542624c1a3bd257b1c3cd09c9cba5c7ac42c2088dff2fb765e547cfb99dbc164fbf33c92d71189c9415bc5ff9001db0d2f69abd2f46f25d8b1642f79328df750c0cfa716541b582e21f4b91f07e69382381b6abd6aa26a8f031e4d4b8a4eab0bd1b46c96d31ebfa3f49c3e46334d58d5a81ad3e836d447cf06ced58108", 0xf1}, {&(0x7f0000001b80)="2786a0b38ea12241836480e265ea0775173756b0f3f2ab7482db96a017e6de9ec575b02a8089cc355f8ae3ca8f20722e3db5f68930ff50b15fbf800dd008948fa14f10664770464078ef642cb11fb92ca15592b6a752faa07f3e504b4f3a771bbd81d5208910a00c07", 0x69}, {&(0x7f0000001840)="87", 0x1}, {&(0x7f0000001c00)="7408a1a329f24b88eba5822a30d98e1636a14f26b4be25a57e50bdb19aee77abc6d55f6c", 0x24}, {&(0x7f0000001c40)="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", 0x1000}], 0x8, &(0x7f0000002cc0)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYRES32, @ANYBLOB="1c001001000000", @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYBLOB="000000003000fe00000000200100000001000000c931a917d6f48656dca5557107a37bd2f8f62ea14aa5a38ba39db5c0987e4525ad9b6ea8c30bb8244c2e922a1ffa723e0bcb7bd8a515d8aa1ebc86302b665cff06c0d69feb01e0380fab1b693c6fd33b432a8401e4218ea6428610bc3ee84fbdd21237e8c263ab2d05b7cf60dc37e77646b3446d1e6ff2be4d5a43f3292cf84b278cbcdd8a9542dea1db29f99a9132ac3501f4eef8", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYRES32, @ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000000018000000000000000100000001f64000", @ANYRES32, @ANYRES32, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3, @ANYRES16=r5, @ANYRES32=r0, @ANYRES32=r4, @ANYRES32=r0, @ANYRES32=r5], 0x108, 0x2400c014}}], 0x2, 0x24000851) 18:36:57 executing program 1: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x0, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:36:57 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x0, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:36:57 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:36:57 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x36, 0x0, 0x0, 0x2e) 18:36:57 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/103, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 1774.823210] FAT-fs (loop3): bogus number of reserved sectors [ 1774.824965] FAT-fs (loop3): Can't find a valid FAT filesystem [ 1774.831612] 9pnet: p9_fd_create_tcp (10255): problem connecting socket to 127.0.0.1 [ 1774.833724] 9pnet: p9_fd_create_tcp (10258): problem connecting socket to 127.0.0.1 [ 1774.853708] 9pnet: p9_fd_create_tcp (10260): problem connecting socket to 127.0.0.1 18:36:57 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1774.869774] 9pnet: p9_fd_create_tcp (10256): problem connecting socket to 127.0.0.1 [ 1775.082956] 9pnet: p9_fd_create_tcp (10271): problem connecting socket to 127.0.0.1 18:37:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/cgroup.procs\x00', 0x0, 0x0) r1 = io_uring_setup(0x7cae, &(0x7f0000000000)={0x0, 0xfefc, 0x2, 0x3, 0x28c, 0x0, r0}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x5}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x8000000) 18:37:13 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:13 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x3c, 0x0, 0x0, 0x2e) 18:37:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/103, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:37:13 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', 0x0, 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:13 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x1) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x4300, 0x4) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x11, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x3}, 0x200000}], 0x7ffff000, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="f2cf44c9b24d422de1cbc15885082e05b1694e4cb9fb38f9288d34c97655c58d16027492dffe953323056b871b3ece5cf3acde9145385a8ee8db2af877853875df3ca51ae11ffb73d36cc4cd6add69be6b9428060f727dbe0d27cf6541a8bf104cab495abd6265b79394bf8d742ff9f8cf0f31828aba338a3b0570f7097fb2971521eaf71c4807b0f6658445d3ea64c0d9e2dc9b0007e82cc4c7dbcab414ea9eeb0384c4bfc18c89204a026d", 0xac}, {&(0x7f00000000c0)="b4243d9fe0a0ddf785898246c23f7d7149e99ea3f6319a0726328dc31b9deecf043adfd9e8a3f2d54b9e1395a3fbb85f1d6ddb8a0c1715b62a499a2608776795", 0x40}, {&(0x7f0000000100)="8fa103fdd235169f2f8cfa050951d913e31fe468f817d7e90e74a5f0dec2e985567148598401bbc7862ae6df19df72dc24a32c111ffa3cc64408ceb38281b6cd13f9ec1145ae9f1c4331fbd4578aa799bcc14ec80f40d87be237653984991c820afee409cac76329e3cf772965f77137d16e055c5b1ec36e2c753749c7110f7dd86dd6948602bef1ac4c517bbaf1f19c745702526e37f06640f3bf24be03e9d2506a4d743e5e7004dbc3615f59c2a9f546fad704195591a1d7b08c0e3920f9c54472a764e583dfd77e6d81046ed89d981e9aace5bb3b473ac7b639f40d", 0xdd}, {&(0x7f0000000200)="b6118545d26a8716d86e4b5e1bebee1d8a5193c63b5442f8fdb7147afc3f6df8725b65f4f115be94edaa872278cb1a5cc7020b1dfdfa7350c5dc9aa41823434b9dc49be1da1cd6abdb162edc30650aa76964a272f4bfec7147f5be37a2e29fa87e6e89d9acec171d0a959d683190fd75ce572b206be22f590110a7ccd928bf2f9d53e09a12473bd557ff5a", 0x8b}], 0x4) unshare(0x48020200) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000004e40)={'syztnl2\x00', &(0x7f0000004dc0)={'ip6gre0\x00', 0x0, 0x29, 0xff, 0x6d, 0xfc76, 0x8, @remote, @dev={0xfe, 0x80, '\x00', 0x42}, 0x40, 0x8000, 0x0, 0xfffffff9}}) connect$inet6(r0, &(0x7f0000005200)={0xa, 0x4e24, 0x6, @local, 0xa8}, 0x1c) sendmmsg$inet(r0, &(0x7f0000005040)=[{{&(0x7f0000000300)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)="13830fb86c6cc7aa082978c88a1fd7ad9ecf2eba905de056121a5eb879f8999d3f8eec328948e711cb34d246a0cb1ec556d1fb566d55c2267c600719594b1f86cb421f02d40d1b79179e65f39d7afd3ee8cf1aa954df6ff740b731d135ec8b23d17c83d3598df5c9cf0c5bab59b01ef5cdcab88a597bf3ff1b1ec3b1cbfe19e743f1bc311df27d125fc102d0d4c8d69d08ba3c68df03a3867dba12045a0ced01c2e642cf5fa2080ca99ac77904fee06b45e48f0c5678bd93d2821543ad1d5510be2ab496834004f6863e2582fd32b4d76d8c16d254fe5681825fe6fc15b0", 0xde}, {&(0x7f0000000440)="a24f82bbd9b2e9304a49fcef390dcffbbfd39417d028f27319506848f185a1f38563b19c8a38934aef0006564d7e8cac277dfbcab11a66c64c5b73", 0x3b}], 0x2}}, {{&(0x7f0000000500)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000580)="c4f1fd91b6204a8dd13b54104b3aae04496f05c28ffd284000b3c9738594a9d63f62215d2f03a4b0f5975b10da6bc4ebb66e586ceeda5d261dfbc217605d81abf1f6f3ef75f522e6d04797ec65ceabcfbd", 0x51}], 0x1}}, {{&(0x7f0000000640)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000000a80)=[{&(0x7f0000000680)="12ad8764649603755deadd2e84d543a074352754e84d9b3eebc145704cf867", 0x1f}, {&(0x7f00000006c0)="79f8c714310c9023810913d720eacf88cf3623d291cc008ccf3929bdaa5cc20830851a8b7455c28b74e8ada475fecf33348f22ef52f8cad2473b81a02ed462ffd966ea6496f688950c6078d9209e1877642475070c901564bb0f0ea0ead4254a72f4ec8b497650b054859e6e88de7b027b7ea91b36944ac0c75c0340770a69aee5ad711795e7d88e29f4ab0ed7", 0x8d}, {&(0x7f0000000780)="6c07d9f87200a371bc17dcef9e1d234f81b2ab3e0a4d1e", 0x17}, {&(0x7f00000007c0)="a13c39ff71b3125d1c625f051804e38d75d646060bbe0917b77adc192a7abc3924e98f912f04e25570192fa9b79aa0f170882978c99ae56a32e550984de5a80b289be08bea55cc8a3972b17c", 0x4c}, {&(0x7f0000000840)="d0cbfed281894350d1a8c8bd927fa2f316a538848b8dfc104c515509fbdc9c7f2d62c4f615b89a41598f9ec690e81f4f810528d7919fb3c562a30c0987b4848e44bd757b120789709c6e2593d97684", 0x4f}, {&(0x7f00000008c0)="8d8e2f964941a8c68d6ca3a0235d856577ba8be4fc07717aedc49f629779febc2cf5fa924fff09782c8f40fd8fd6d682d1235f4b08194dd3a771b716a9a6c371b35f2b460cfe67694bc97e1823d826e3e51ca66fbaea011faa216474bdc12460cd754010a9b2324e35779d970e7dd2a2efbac6ac98300e27ce7cc6cb6560572a5780c54d654f869a571795ec1fcb802b217a45b27a92", 0x96}, {&(0x7f0000000980)="2a7be3669eea60764ab975f1dbe61efb59d52df7bbe86e49f90f8f8f05c22194828be752e7063f236bc15ce66a6dcd6bdf1df0014de40d9928fa81b0e2e194e9416fc9886b3c391536beffcc60d2e8026f4a31daee9f420a47e93f271829f8a682667192b212190016ef472edd58ea0a647e9abcf43044fe490ebc0f4109bcf89afcc6212c715d85618914b3322a440cbac52c32d1a2bc6688b703c2d51994ed8251cb7277847bf7cff29380973c3d269f3c8a5ee52864a088c22a1f73e9cb004152142484", 0xc5}], 0x7}}, {{&(0x7f0000000b00)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="a19a8a839e9fbd98acc84deb941c412ace36c82817d92a5d62c68693c16398a162e9743213c09d2f3ef0241613778f0295755d1e826bac03c5ceec9f7e7adaff936e08f7a4862528487852", 0x4b}], 0x1, &(0x7f0000000c00)=[@ip_tos_int={{0x14}}], 0x18}}, {{&(0x7f0000000c40)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000003180)=[{&(0x7f0000000c80)="fe21e8a9840a97ac3b72cd9d2b58ff630552fbc492f8096a79dcc4638d0058e53792b8389abd2fdae6173b2396323e0cb1519ca9230f62c1637d11ec829f3397ff8621a79de4218dd39969c989d70acd5c935ec6f37699454f8e35539b1a24560dc2c90a9d", 0x65}, {&(0x7f0000000d00)="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", 0x1000}, {&(0x7f0000001d00)="cce2bb9b7fddf0771641f2dee18ceeb8bf9dc704776dbee18e696d2fdfb1e6241f1e7bb44b5ab01c4d79b9f07653cfdb399132fcd4dca1bd19450817f18639c3be9fe5e9ab9ac17ec5ff8d9b9134837f4db8459290db69b2b3a9220737855f7204320772e062403d49dfa37b8f971f1d6ae3dd727b9f0ca8d9555fb935cdff71404db649aca0b39bfe7296e799b7c64d006b5c3c1990a0b6bed7c1894cb45b929cb687aac2cc9736dc3b3c65097fef6511285108ba01ca7794d0264d4ca4d1027a7562e34621101457929f10662e1b3771", 0xd1}, {&(0x7f0000001e00)="c7e33d0627a1fb57426fb4443d4d512e1b644782b4fe9b91699e27144837a86fa85d44d5ed4472ba68701b5ac048ee8d633fa5d910a626c3da56d19c9e0f6a31b857b6bf0196078b87c91e472720d246723c4010a57d95935596c633c54c8dc78fb8f8429a8933f3c1c1ba079f4d849bfee59b057a3cd5f85bb12c20c6a4165b56291b490aa169e47629a1a40c462f", 0x8f}, {&(0x7f0000001ec0)="2a6a8d274b9eda4f190eefd76f961b9f253c8eac27d45fa6cc31dd8750f94d90aab195f5829808408c241b661180b4885766f28ff80f5c3e73e40cd8ca0df6761c0eafbfc4ede599e056e94b8e4c2d289f749ad236feb91a28b9cbda3bf78aba5b7939dfa0122705ac12504969686d29d1f0f3c4dcadef5a5b70bcd29fc21ef5765ed3f9be07d08230f63acfe36154d06d349ef92980479c57f941f646c5a043835f39c0a98cb6be7d590626eb1f400e7c7cda5e6acf720e4e3a62db5d8e9072552928410744021097783cf3347ed4bf4d783580000e3cd89c929486202354e48f55aac1c47a539474a33cdd73f029b9", 0xf0}, {&(0x7f0000001fc0)="60e45d203c83f802823f963947a1328bfd804b7064e26141d34ba75d77d1b9d4fb572a50c073392c6b8bbaf0cbbb72b5479d9e272e8105c2108424d5ef4dc4f79e0d741f41034ac30150bd1b76061c667f2b8944dfbec09c526a5ae85f29d0b7d2c7fc72440be489f1bd6eaf6d65e9533e4ec596d937939ca84db697976334cf9898d6df2776ed600693160920c4cf6289ab7565b6a85cdc180fb952bf", 0x9d}, {&(0x7f0000002080)="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", 0x1000}, {&(0x7f0000003080)="1671f96291df01852d476c5cf0dbcfb526b2aa47b1c67157f50296342f7cbde1410bbfeb31e27a7f7c5c51b77351f61b3bf53039d5f01e54b238cd09d9ab8506c1fc875ed84a6f1bf51e9838afd880e6595f246b99dbe777e681c61dc0603a29e87ff39e5d3ddc401dff19649983b1f8c9769eaa54d518d74a0f851588423e16314a577a046b9d8de5b87562889fd6758c7c0f432f5decb12a45ac2174fc4de292e61504bd792ac7c3bbdebbd307588b052167896b1afca7eec3f65af98c5a618406366798b0d06845f7955f0f5c5fcbc76822243bcd96e8adec", 0xda}], 0x8, &(0x7f0000003200)=[@ip_retopts={{0xb4, 0x0, 0x7, {[@cipso={0x86, 0x20, 0x2, [{0x2, 0xe, "83e3c47191bb80dfeb393784"}, {0x5, 0xc, "ead1404f95d5eb728949"}]}, @timestamp_prespec={0x44, 0x1c, 0x30, 0x3, 0x5, [{@empty, 0x9}, {@broadcast, 0x7}, {@loopback, 0x3ff}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xfe, 0x3, 0x2, [{@loopback, 0xffffffff}, {@multicast1, 0x7f}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x5}, {@rand_addr=0x64010100, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}]}, @ra={0x94, 0x4}, @lsrr={0x83, 0x23, 0x33, [@local, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @multicast1, @rand_addr=0x64010102, @remote]}, @generic={0x89, 0xf, "a4c179f8e324abd5d720937f94"}]}}}, @ip_retopts={{0x58, 0x0, 0x7, {[@timestamp_addr={0x44, 0x1c, 0x50, 0x1, 0x9, [{@multicast1, 0x20000000}, {@local, 0x3}, {@rand_addr=0x64010100, 0x4}]}, @timestamp_addr={0x44, 0x2c, 0xf7, 0x1, 0x4, [{@broadcast, 0x3}, {@empty, 0x401}, {@empty}, {@multicast1, 0x6}, {@dev={0xac, 0x14, 0x14, 0x44}, 0x9}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x10001}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3f}}, @ip_ttl={{0x14, 0x0, 0x2, 0x10000}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast1}}}], 0x178}}, {{&(0x7f0000003380)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000003980)=[{&(0x7f00000033c0)="ae4b73c2fa4f", 0x6}, {&(0x7f0000003400)="c621425ca94dfef0908d858fa6b0257a014b616103788a26", 0x18}, {&(0x7f0000003440)="32b554f3c8cc2f2f8df45ca33ced7b5340827d61d16e687b987142335ab48be87b4454d87db84586674b9e18a8c597ae7765ea0b679cb961a8bcdb15f662c1ff9478d0be74e968ab1907cbbd2317ded36496ede65da341d2a2e026dfa59bc92c12d4cb9b91569e3e53dfce7db1ce4dd2e6d9f3a1de611595b3b2e47aada9ee752aaf7a26c3a1258ef6bba163ae882bae66f1eda8cf7dc6a79ea16d7a843fe200eac82676bead8e550a423a3828965b07727443340e73a80b43fc1236df4310860dbb02e4f8904ff6ec96d5d799f07edcc360cc32ab7396dce1918fbf", 0xdc}, {&(0x7f0000003540)="2cf2c1f2584515a7b9520b99f9ae4df94c8191781ad438f3b6c53f6dbe8fac106c70c9de34a9ef1fbf21dc5a635c66fc6fb21e28dd3c9fed4cbd7403484a82be100102ca9d1265a5176883b3592216705bc73f4962c9b5483f91d1da5f7457ca3cacf01a29980a90c370149ac31e0cc7498fad118bff1c42c1fde22c473e14c78150403a14e27c4cd745201428c046654710935b804ae38f6d", 0x99}, {&(0x7f0000003600)="88567414d14272c433098995817aad6d510b7368772794702bc265e181d5ac1dbcb92413772c315a72516970cd4d96eda91f45b8dae30e74fc4ddf400de95d0a88925c1ff71ed3", 0x47}, {&(0x7f0000003680)="3f8dd73ec4e04587aa19ebe75d34958472fdc859381313abcd53052bde499183ef889973e688519272a60467b7555a3a", 0x30}, {&(0x7f00000036c0)="a6a8a14840b003f465eddc30e424a8e86f70198f678c4fb073acd4ab8e46e1283a97f144abd191ac6b7c84a3deb972217cb06287bf5239b16c7199f34d794c79087a8a61a495d96babb35c6229eaf8a4e8dfcfcbef02dc5ae35d15942ae46cf1c6e89ec170f7e8f9ffe3a0d9582e4bcfb55a856834b9680703cda10b824af8e44987536fdd4b2fe18c656bd8398f69f6b8bda2f04eed228b362c7e2cd0c2eb3d3e55c264b4cd73fceff852e4142a11fa88a06940d498f7780d1a17b815933c12ad73759344e872cbaeafa90652eb1e94edb8dbbc57e02e05d11275150646d44189233f8dee7620449a6284f837", 0xed}, {&(0x7f00000037c0)="84fa9cc29bd67bbaf61986190e4a97263ae0610d91757390cd8d2e1307c8cfb62fe0e1cadf9cb77669a821eba48d2febe582a6f8d278125d6c7591cd3cde3dcdbe0f6f8a352aad550c37ae3016759554b30c701773597e2c735fcadf09f4339f84a17339af9ee25afc24ce309b1ca0bde4569d5f77006e4c24c292bf8349a48dce204bfb286d679a1827c1dd79457b0944b9a2cfebf2ca690ace6bb47128626168fce075854ea7f720d6c7358d81cefbc8921d1747192acf7c5155173661865b51d818e0707b1703a90084520157eb0eddb4e8a8559b1947b8482ef935616b8132c29c36daa930825f0a2ff3e9e2583d1f3441", 0xf3}, {&(0x7f00000038c0)="b1707896467e9e9bc74eeef7744b0156ed47d80b8d465e192ad5a0a1b756e6af4ea8ec518bd8837f17e4bd288980524950579e41897bf347d6b9143a697426fe94d64a9f4d512a32646eb0c5c72ea3ec63fabaa10b153f3aa69606d2231a57892fd93356c932209f0e083a", 0x6b}, {&(0x7f0000003940)="8a1a5e", 0x3}], 0xa, &(0x7f0000003a40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x8000}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}], 0x30}}, {{&(0x7f0000003a80)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000004d40)=[{&(0x7f0000003ac0)="ebc6b0e1", 0x4}, {&(0x7f0000003b00)="20056572de25bf65f7ccb919d2169dcb9f96eb67f8baa640622124a437dba3c1b92dbda16adbf35e850b5fb952ab7c38f11f8526b7da975e0d1923740e2c92e580fca3534c44f09a89d8597416e749dadc804d26a169621d1c61bda21d155a53b1442d46b40885317981098abde7", 0x6e}, {&(0x7f0000003b80)="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", 0x1000}, {&(0x7f0000004b80)="a9bd1bbcf0aac941ebd1b76864e74636f5e1956907e6590fdf22c22e5c58838fa1f122a4b9d3c7dad93aa21ac2f586c5e8bd8a8f071012a532fb38144313cc4935ecd5fcab2dab9e997597818c62aa49a3c05980f598460f7c92ef9ff6ab027ea7ebe2f886e963f47f0cc1d0d8c5790e6de5516e3215bc916f20d94bd60706bd745a4509bb04d88913fdcd5f3c2fe6e2331a1f8764fb9e30410865fbfb1d05faf422b721785c9d1da3a989448f49543d90df46ebed0191da62cd3da0e47580ec98c0bc569688c22c0b1a0e9e0563dc460d3471271f49237a664a9806df9a33bdf3c35f9feecf631503750f46740e3b5a264867", 0xf3}, {&(0x7f0000004c80)="ce45f69c631dfc17e2407d629022e04357b2e2ef97734ec31433743a7b0292fc3dada033fd52f22b886e2c045aa442eb94e41c70653be7bbe0f6bc36713ce9127760788e0150fcc6575154299a8cd7ea7014d525635a01a19aaae59779c1cc0ca97c1dcb0b7f2adad84abe463d76d1539c333d96d1660caf41c9", 0x7a}], 0x5, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_ttl={{0x14, 0x0, 0x2, 0x400}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @private=0xa010101, @private=0xa010100}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_retopts={{0xf8, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @generic={0x82, 0x8, "133c77d08e77"}, @cipso={0x86, 0x4d, 0x3, [{0x5, 0x4, "ccbb"}, {0x6, 0x6, "ec034992"}, {0x2, 0xa, "00f9a844f9340b7b"}, {0x5, 0x5, "55e3ff"}, {0x1, 0x4, '\v\t'}, {0x1, 0x9, "ca03377ab8e8cb"}, {0x2, 0x10, "9a2300bd95446800546a6c964d94"}, {0x0, 0x11, "cd2c54af445d2b627c5600c52ebe90"}]}, @ssrr={0x89, 0x27, 0xfe, [@loopback, @private=0xa010102, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010102, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x3e}, @remote, @rand_addr=0x64010100]}, @timestamp_addr={0x44, 0x34, 0xd5, 0x1, 0x5, [{@rand_addr=0x64010102, 0x5bb}, {@multicast1, 0xfffffff9}, {@local, 0x7fffffff}, {@loopback, 0x200}, {@loopback, 0x800}, {@rand_addr=0x64010102, 0x1}]}, @timestamp_prespec={0x44, 0x14, 0xba, 0x3, 0xd, [{@multicast1, 0xe31}, {@local, 0x10eaf02f}]}, @end, @lsrr={0x83, 0x1b, 0x62, [@private=0xa010100, @rand_addr=0x64010100, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010102, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @noop]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}], 0x1a8}}], 0x7, 0x20004000) unshare(0x2000400) r2 = socket$packet(0x11, 0x2, 0x300) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="ca73da4133fc"}, 0x14) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000052c0)={'syztnl1\x00', &(0x7f0000005240)={'syztnl2\x00', r4, 0x29, 0xdc, 0x6, 0x0, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0, 0x8, 0x40, 0x7f, 0x2}}) 18:37:13 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x0, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:13 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1790.930287] 9pnet: p9_fd_create_tcp (10298): problem connecting socket to 127.0.0.1 18:37:13 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x0, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:13 executing program 3: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1790.963041] 9pnet: p9_fd_create_tcp (10290): problem connecting socket to 127.0.0.1 [ 1790.986800] 9pnet: p9_fd_create_tcp (10293): problem connecting socket to 127.0.0.1 18:37:13 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:13 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', 0x0, 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:13 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 1791.161161] 9pnet: p9_fd_create_tcp (10316): problem connecting socket to 127.0.0.1 [ 1791.172479] 9pnet: p9_fd_create_tcp (10315): problem connecting socket to 127.0.0.1 18:37:13 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:13 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x0, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1791.258590] 9pnet: p9_fd_create_tcp (10317): problem connecting socket to 127.0.0.1 [ 1791.279615] 9pnet: p9_fd_create_tcp (10312): problem connecting socket to 127.0.0.1 [ 1791.397986] 9pnet: p9_fd_create_tcp (10332): problem connecting socket to 127.0.0.1 [ 1791.401524] 9pnet: p9_fd_create_tcp (10333): problem connecting socket to 127.0.0.1 18:37:26 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r1) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000180)={0x0, 0xfffffffffffffe9a, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000002100000009001f00706879310000000005002000000000000c000500000000007fffffff"], 0x34}}, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 18:37:26 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:26 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:26 executing program 3: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:26 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', 0x0, 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:26 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:37:26 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x48, 0x0, 0x0, 0x2e) 18:37:27 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:27 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1804.801072] 9pnet: p9_fd_create_tcp (10361): problem connecting socket to 127.0.0.1 [ 1804.813476] 9pnet: p9_fd_create_tcp (10360): problem connecting socket to 127.0.0.1 [ 1804.816032] 9pnet: p9_fd_create_tcp (10353): problem connecting socket to 127.0.0.1 18:37:27 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:27 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xdffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x3, @loopback}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000480)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="00000000000000b5004a2f66696c65300021b94e14b7a2d8a2ed26a07417cd6bb22bc50257da76948c949aff6f77b6ba4f8cfd8cd86bf99929e870f8e3641a25cbe9ffc70e19ac87afea734af77571fea6a07701395e44a9ebf94c8dbbc322a8af305a8c776521e7784beae94a53010aa14093ad4c39336981e33bab4c17bb820ef5c2bf35bc44193187234865ab4945863ae9894b39dd5d2a4c4f5630f37d30ff2d8433"]) sendmsg$TIPC_CMD_SET_LINK_TOL(r3, 0x0, 0x80) fallocate(r3, 0x0, 0x10001, 0x100) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x5, 0x1, 0x2, 0x31, 0x0, 0x3f, 0x10800, 0xc, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x100, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x41010, 0x81, 0x7, 0x2, 0x10000, 0x2, 0x7, 0x0, 0x5, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000001c0)={0x0, r0, 0x2, 0x1, 0x10000000, 0xfffffffffffffffc}) setsockopt$inet6_tcp_int(r2, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9bbb) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000140)=""/123, 0x7b) lseek(0xffffffffffffffff, 0x2, 0x4) accept4(r1, &(0x7f0000000240)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000080)=0x80, 0x0) [ 1804.864224] 9pnet: p9_fd_create_tcp (10362): problem connecting socket to 127.0.0.1 18:37:27 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:27 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:37:27 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:27 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x0, 0x4}, 0x0, 0xa, r1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xffffffffffffffff, 0xee01}}, './file0\x00'}) ioctl$EXT4_IOC_GROUP_EXTEND(r5, 0x40086607, &(0x7f0000000080)=0x4000000c0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$nfs(&(0x7f0000000240), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x3, &(0x7f0000000500)=[{&(0x7f0000000300)="b09456e1cc1abe3be01b5ab628f4f34a9a6cc65a92f9877ae3771e21d09c820335483bdc14c4696a6b7661a1c0cd40bf760bbd9d7976fb11c6db4c32f90d212b2447c78c0bb70e2341b9135a36e3d037b1", 0x51, 0xffffffffffffffff}, {&(0x7f00000003c0)="734392bf111e34ad89833539b8bc9d0c90f5905723c06cb62a77178037bdf869a9e9f9cf93423b1c6c08e00a09fffd1739e62303500b707c15a15ce9cff7d35d67b8f1929ea5dbb86e30efc44374d16ea8b43e80ec4d305a95b6b85adc47c8abfc", 0x61, 0x40}, {&(0x7f0000000440)="ffdd14b2d545b969616d54fa413948ca8c884e05a5e0b29fda45678de5b6ea9b32040cfbe28f87c93cf898c2624a360384a71f96dc79194b8c9cf744da855ca0b5aaf22f51db7f7c1cf4850f245977421e5f993e2c5e97146ac61139caedb63455f06e0ac29e00f522a151c2774de3ac62b0621adbe8f1cfca71952a01bd410dbd0731eb96367acfaef362026b898c9311a95951a302f26d1b3d3c6fb59470b3ce9e99d98277d23940f8e92a64207f20951d9407895b748c482f265db1", 0xbd, 0x5}], 0x1, &(0x7f0000001840)={[{'-$wy\b'}, {'rfdno'}, {'9p\x00'}, {'\xfe\ao\x9cd\xd8\x92V`\x10\xbc\\\xb1\x87\xc5OSX\x82\x8ae\xfb<)\x1e\xc1$X\x9c7\x7f\xc9\x90\xea\xc6F,(/\xee\xf7\xc2_0.\x1b\x80\x9e\xc0\xb2\xa2\xcf\xa8\xc6j\x8c\xa1\xcen\x89\xa3\x14z\xfcv\x04\xd3R\xf4\x92FK\x1c(x\x03{F<\a\xc0q\xd8\x97\x94\xd1>\xfa\xaf\xa7\xaa\x17\xa6\xc0f\x19\x92G\xe2Y\xbf\x9eG\x1cG\x0e\xc7BR/Q\a\xa5$oN\xb9\x11\xb6[\x84=\x9f\xd2\xaf\xdf\xcaV\xe9\x1c\x87\xe5\t\xef\xfa\xd0\xbc.\x18\x10y\xdf\xe5\x90\x8a\xd3!\xf2\x91\x0e\x8c\x03\xa8\x9b\x0e\xbe/\xa8;\xd4A\x83LW\xcd\xe6\xd0y\xf0\x7f'}], [{@hash}]}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x99, 0x3f}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000019c0)={0x10000800, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680), {0x2c}, &(0x7f00000006c0)=""/36, 0x24, &(0x7f0000000700)=""/4096, &(0x7f0000001980)=[0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x6, {r3}}, 0x58) r7 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000200), 0x200) dup3(r7, r6, 0x80000) ioctl$F2FS_IOC_GET_FEATURES(r5, 0x8004f50c, &(0x7f0000000100)) close_range(r6, 0xffffffffffffffff, 0x0) ioctl$HIDIOCINITREPORT(0xffffffffffffffff, 0x550c, 0x20000000) writev(0xffffffffffffffff, &(0x7f0000001d00)=[{&(0x7f0000000000)="3d2c184db61dab6488df7c55dd102cb4e0428e9e2ab464304d53ab1008999cbd3dd9424fbed004e2", 0x28}, {&(0x7f0000000280)="38b1dc62", 0x4}, {&(0x7f0000001a40)="38b8b0a720eb14fde3be8532feafa0b3cfc371db1d452f6c005395b390b0f03f3ed8b08d5733c5a24c68d9f312b4ee55609f920864e0f5ddcf511eeeca328a7a3113f7aae7887cb1fab9388da0ca754c3709f93293e69127d4e4a9951a3019ab0cc88b774782fa14aee417c4c77327aaa33909d76bbcf763dd1f8456408167298532eccdfa95da59fc132eedb1cb371706", 0x91}, {&(0x7f0000001b00)="bd8a36ea9e52aab42d64ad30ac7875141a627a9f30023d9114cc2d7b5465a339317b927757f2eb044b0aaa320cf6b45b2169a7a3192b279c730e65f13f17c7428b9783238985e371f5545f0e54d2a1c7a6d9af298ad4db78a9cac4bcc7b571ed279862e5c9837e6a79206358c640a6ccdbbdb6875a0ac355c1366cec602474e55b661188a68992bda9a8548fb8afa7a3d22ea8f667f27a2c3d7976100d93a6c419ba42f6ed5166fe5621f1674e21fca294cfe36c57cbcbaaf750182ba314655d2db466e68e", 0xc5}, {&(0x7f0000000580)="a64197244a3f7896976c78e788e4a10646a1f569ff644a16dd43bf233270086f61fff3f13b8e00500494ece55aa07fb4855c0105ea37d5bc76c1ff66fbca82b891c545348e0bb009ba50d08107c7caad3073a1b5f01d510c90eba1754fd8ad5537d433470e9b48fc", 0x68}, {&(0x7f0000001c00)="afbe66ba2d567b5cb2d83066031433fd022757cbf94b53d8bcda5b9eac4c7b9253dfb89df3ebd539f09928f49359b465b2d225e39aa8510599fd4a02c9bb0e69dcd6484ab0559580e20f2855a126f2804d353f66f111d006e40f17261ed4784dc8dc55878be5e7d46cdd6ecd53085b0e254b4503a6e11dbb04ae37470bf5670dee06f5eb03bb93fb33b70cf20084c6fbe7a508a82e8a7de250e454bc854841b149a5138f1c1847f566e7bb1b96dbc7d8793b1d9731b637e13442b0f2a249a2e50b8b", 0xc2}, {&(0x7f0000001940)="2450545390cd966530f971bb37788f49e710d73319e1e2bd45f272", 0x1b}], 0x7) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB="2c00015c5eb17536f745b8d3eb902d97bf3140d238bd0d822dc0939c958d998c6ca12d9d65cfc0cb066eeb7d436fe9671c1c3c207690886337c496023c47783e14fa332a47a98b46214867b8aab011f988383c86cea936a42cfba381ed8614543450c7e7ea40f86fe890a4ff95f5050efed3199162b6e423c4908778fa8484d8bf16ac77fef80d6e4d8b569479b617dfaae26e9ea48b8aed9406a1ce8fc2f75a37d128ba5311882d4ba0aa57869b989d10dc8527d2c37334319875d76e62df84a61becfe570d0ab8d4552d058aa4e5d38c65ceecbb35b3452674a9a5d33777a9a4ee05e0e432f61062c6fbf126978ae9c51fcd"]) [ 1805.085024] 9pnet: p9_fd_create_tcp (10370): problem connecting socket to 127.0.0.1 [ 1805.095064] 9pnet: p9_fd_create_tcp (10373): problem connecting socket to 127.0.0.1 [ 1805.131310] 9pnet: p9_fd_create_tcp (10377): problem connecting socket to 127.0.0.1 [ 1805.168332] 9pnet: p9_fd_create_tcp (10381): problem connecting socket to 127.0.0.1 18:37:27 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x0, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:27 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:27 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:27 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fremovexattr(r0, &(0x7f0000000140)=@random={'user.', '\x00'}) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, 0x0, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000002ec0)=0x20, 0x4) pwrite64(0xffffffffffffffff, &(0x7f0000000240)="9b86dd3c2ef5657e2cfe67738acb6456c805e58753d22943bf20a699835d636ed2af33d3bbc7452b991e9b14335a0432f1c27684db13731edeee6588620097f620887af78dec8a12b1fdbf4eb9022fdbe7dcdadd533c5b68dc41f134509c6ff87f737c850b2d85077e8bceb3ca9926e13aaeac5f152c3e899d8ce7cf7fda9d7658b171c3bb8af2231e51c5f34fae8e6f0f13df0a08af3c074494079d549e7502c3fae2df2d3572bc0f37e5e379e52a8ace9ebc28b48739c3ac646cf45488eef5c15b39", 0xc3, 0x9) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0xb07, 0x109040) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, 0x0, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xeb46}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000050}, 0x40a5) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) listen(r3, 0x6) 18:37:27 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1805.376896] 9pnet: p9_fd_create_tcp (10394): problem connecting socket to 127.0.0.1 [ 1805.398594] 9pnet: p9_fd_create_tcp (10395): problem connecting socket to 127.0.0.1 [ 1805.436637] 9pnet: p9_fd_create_tcp (10397): problem connecting socket to 127.0.0.1 [ 1805.449753] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1805.482837] 9pnet: p9_fd_create_tcp (10402): problem connecting socket to 127.0.0.1 [ 1805.535645] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 18:37:41 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x4c, 0x0, 0x0, 0x2e) 18:37:41 executing program 1: ioctl$BTRFS_IOC_FS_INFO(0xffffffffffffffff, 0x8400941f, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000240)=ANY=[@ANYBLOB="01e6487d743d0a543eafbe194f000000000050c9c7e039000000ff73b6b6b7a32d4e244731fed6f89820192ac71b96bf37b65f476900071efb3bc28a7ee8bca67cb396cbddf914ac76ec5b06001d29ed9c52568cf89149d9a8cda7f42c202602d6e6681c8195909183d45ac81fc785bf44c58bc7dbb68ce04f73a2a9bc6cfcfe45e39aff479a83150632769fa71b3b5ebaf6d010b70c671bdb97e499d661dd3caa493ac20a74700e4e2da28f1f7ec9d8c26586"]) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) sendmsg$NL80211_CMD_SET_REG(r1, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, r3, 0x800, 0x70bd26, 0x25dfdbfd, {}, [@NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xb}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}]}, 0x2c}}, 0x40800) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, 0xffffffffffffffff) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f00000003c0)=[r1, r1, r2, r1], 0x4) r4 = socket$nl_generic(0x10, 0x3, 0x10) dup(r4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r4) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x400000, 0x0) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f00000001c0)={0x11, @rand_addr=0x64010101, 0x4e23, 0x1, 'lc\x00', 0x4, 0x100, 0x1e}, 0x2c) ioctl$F2FS_IOC_GET_FEATURES(r0, 0x8004f50c, &(0x7f0000000800)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0x541b, &(0x7f0000000040)) 18:37:41 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:41 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:41 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x0, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:41 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:41 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3a7b, &(0x7f0000000480), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, &(0x7f0000000080)=0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(0x0, r1, 0x0, 0xffff) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r2, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./mnt\x00', &(0x7f0000000400)='system.posix_acl_default\x00', &(0x7f0000000780), 0x24, 0x0) r3 = syz_io_uring_setup(0x5548, &(0x7f00000002c0)={0x0, 0xf22b, 0x2, 0x1, 0x3cc, 0x0, r0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000400)) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x10, r3, 0x8000000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) syz_io_uring_setup(0x526e, &(0x7f0000000200)={0x0, 0xae83, 0x2, 0x2, 0x1dc}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000140)) 18:37:41 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 1819.181269] 9pnet: p9_fd_create_tcp (10425): problem connecting socket to 127.0.0.1 18:37:41 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1819.219918] 9pnet: p9_fd_create_tcp (10426): problem connecting socket to 127.0.0.1 [ 1819.225296] 9pnet: p9_fd_create_tcp (10427): problem connecting socket to 127.0.0.1 [ 1819.230060] 9pnet: p9_fd_create_tcp (10431): problem connecting socket to 127.0.0.1 18:37:41 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:41 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x0, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x18, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313539353330323300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="0000000000000000000000006a641059655a4e10bf1130ee7fdbd1e0010000000c00000000000000d9f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d9f4655fd9f4655fd9f4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f00000000000004000400000000000000050000000c00"/64, 0x40, 0x2200}, {&(0x7f0000011600)="200000007412ab417412ab4100000000d9f4655f00"/32, 0x20, 0x2280}, {&(0x7f0000011700)="c041000000380000d9f4655fd9f4655fd9f4655f00000000000002001c00000000000000000000000d0000000e0000000f0000001000000011000000120000001300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000d9f4655f000000000000000000000000000002ea00"/192, 0xc0, 0x3400}, {&(0x7f0000011800)="ed4100003c000000daf4655fdaf4655fdaf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000002010b1b000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x3600}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}, {&(0x7f0000011a00)="ffa1000026000000daf4655fdaf4655fdaf4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3731353935333032332f66696c65302f66696c65300000000000000000000000000000000000000000000026908b44000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3a00}, {&(0x7f0000011b00)="ed8100000a000000daf4655fdaf4655fdaf4655f000000000000010000000000000000100100000073797a6b616c6c6572730000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aa02805e000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000000002ea040700000000000000000000000000006461746106015401000000000600000000000000786174747231000006014c0100000000060000000000000078617474723200"/256, 0x100, 0x3c00}, {&(0x7f0000011c00)="0000000000000000000000000000000078617474723200007861747472310000ed81000028230000daf4655fdaf4655fdaf4655f0000000000000200140000000000000001000000150000001600000017000000180000001900000000000000000000000000000000000000000000000000000000000000000000000000000000000000cb34f3d3000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xc0, 0x3de0}, {&(0x7f0000011d00)="ed81000064000000daf4655fdaf4655fdaf4655f000000000000010000000000000000100100000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c91b90e27000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000000002ea04073401000000002800000000000000646174610000000000000000", 0xc0, 0x4000}, {&(0x7f0000011e00)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00lersyzkallersyzkallersyzkallersyzkallers', 0x40, 0x41c0}, {&(0x7f0000011f00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x6000}, {&(0x7f0000012000)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8070000", 0x20, 0x6800}, {&(0x7f0000012100)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x7000}, {&(0x7f0000012200)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x7800}, {&(0x7f0000012300)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x8000}, {&(0x7f0000012400)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x8800}, {&(0x7f0000012500)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x9000}, {&(0x7f0000012600)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x9800}, {&(0x7f0000012700)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0xa000}], 0x0, &(0x7f0000012c00)=ANY=[@ANYBLOB='x']) 18:37:41 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x81000, &(0x7f0000000000)={[{@subsystem='blkio'}]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup(r1) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x30, r3, 0x325, 0x0, 0x0, {{0x32}, {@val={0x8, 0x67}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = dup(r4) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x30, r6, 0x325, 0x0, 0x0, {{0x32}, {@val={0x8, 0x67}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0xd1dc, 0xfffffffc}}, './file0\x00'}) 18:37:41 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1819.452676] 9pnet: p9_fd_create_tcp (10444): problem connecting socket to 127.0.0.1 18:37:41 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 1819.487250] loop3: detected capacity change from 0 to 262144 [ 1819.510759] EXT4-fs (loop3): Unrecognized mount option "x" or missing value [ 1819.520327] 9pnet: p9_fd_create_tcp (10448): problem connecting socket to 127.0.0.1 [ 1819.528609] 9pnet: p9_fd_create_tcp (10451): problem connecting socket to 127.0.0.1 [ 1819.546841] loop3: detected capacity change from 0 to 262144 [ 1819.562625] EXT4-fs (loop3): Unrecognized mount option "x" or missing value 18:37:41 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1819.699953] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1819.797931] 9pnet: p9_fd_create_tcp (10468): problem connecting socket to 127.0.0.1 18:37:55 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:55 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:55 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:37:55 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x0, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:55 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) syz_open_dev$sg(0x0, 0x0, 0x2001) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7002) ioctl$BTRFS_IOC_RM_DEV(0xffffffffffffffff, 0x5000940b, &(0x7f00000004c0)={{r1}, "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"}) r2 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000001780)={{0x2, 0x0, @remote}, {0x308}, 0xac1414f1, {0x2, 0x0, @broadcast}}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x90f, 0x0, 0x0, 0x2192400, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="6e6f61636c2c00dc3e99ec2ba52de57bd76c256d7846ad5720ff86b8d32833faceada1ee817bb3cf71eb0000003bc1080a45175db9cfadf2c01fc3ccfa232f3d454cf7c1955633aaae6a5ead04e88ea91574f5c965a8f182062f610dfc4b9526cb9ce6b010d9bbfc1729a79c474f2a839d4278630b32a278e8c3ecf53bad7b"]) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000040)=0x1) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x4300, 0x4) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00)=[{{0x0, 0x11, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x3}, 0x200000}], 0x7ffff000, 0x0) fallocate(0xffffffffffffffff, 0x2, 0x9, 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000180)=ANY=[@ANYBLOB="85c2a763148ee2d18a9faf72c6d6ef161bee24eb835405", @ANYRES32=r4, @ANYBLOB="02000000000000002e2f66696c653000"]) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000200)) 18:37:55 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:55 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x68, 0x0, 0x0, 0x2e) 18:37:55 executing program 3: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x80000, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5de2}, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = dup(r3) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="2503000000000000000032000000080067000000000008000300", @ANYRES32=0x0, @ANYBLOB="0459e964555fa3b000d66621984d4f9b9d5592501917d748fa09bb3e36fcec03fc296a8dfdbe16826e1ab82db862205f3eb8f521152269a94be869b0ce8dc6"], 0x30}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {0x0, r9}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {0x0}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {r7}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005a840)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1, "bdc369dd641c13"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {r18}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r18}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {0x0, r17}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {r18}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r18}, {r15}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b840)={0x0, [{}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r20}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r19}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {r13, r16}], 0xfd, "1e6421f17cb7d6"}) write$P9_RREADLINK(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="109bbc6285fb4e02000f103e2f66696c6541"], 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r21 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r21, 0x0, 0x100000001) [ 1833.696941] 9pnet: p9_fd_create_tcp (10483): problem connecting socket to 127.0.0.1 [ 1833.724023] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1833.761201] 9pnet: p9_fd_create_tcp (10489): problem connecting socket to 127.0.0.1 [ 1833.766072] 9pnet: p9_fd_create_tcp (10486): problem connecting socket to 127.0.0.1 18:37:56 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, 0x0) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:56 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x0, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:56 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0x0, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1833.932177] 9pnet_virtio: no channels available for device 127.0.0.1 18:37:56 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x0, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:37:56 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 1834.102730] 9pnet: p9_fd_create_tcp (10502): problem connecting socket to 127.0.0.1 [ 1834.293249] 9pnet: p9_fd_create_tcp (10510): problem connecting socket to 127.0.0.1 [ 1834.303977] 9pnet: p9_fd_create_tcp (10511): problem connecting socket to 127.0.0.1 [ 1834.452701] kauditd_printk_skb: 34 callbacks suppressed [ 1834.452718] audit: type=1326 audit(1739299076.761:172): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10481 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f076ec1ab19 code=0x7ffc0000 [ 1834.463295] audit: type=1326 audit(1739299076.761:173): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10481 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f076ec1ab19 code=0x7ffc0000 [ 1834.470672] audit: type=1326 audit(1739299076.770:174): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10481 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7f076ec1ab19 code=0x7ffc0000 [ 1834.478680] audit: type=1326 audit(1739299076.776:175): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10481 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f076ec1ab19 code=0x7ffc0000 [ 1834.486494] audit: type=1326 audit(1739299076.776:176): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10481 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f076ec1ab19 code=0x7ffc0000 [ 1834.496247] audit: type=1326 audit(1739299076.779:177): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10481 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f076ec1ab19 code=0x7ffc0000 [ 1834.500880] audit: type=1326 audit(1739299076.779:178): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10481 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f076ec1ab19 code=0x7ffc0000 [ 1834.511060] audit: type=1326 audit(1739299076.779:179): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10481 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f076ec1ab19 code=0x7ffc0000 [ 1834.517320] audit: type=1326 audit(1739299076.780:180): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10481 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f076ec1ab19 code=0x7ffc0000 [ 1834.522081] audit: type=1326 audit(1739299076.780:181): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10481 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f076ec1ab19 code=0x7ffc0000 18:38:09 executing program 1: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:09 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:09 executing program 3: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x68, 0x0, 0x0, 0x2e) 18:38:09 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0x0, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:09 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x0, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:09 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x0, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:09 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:38:09 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x6c, 0x0, 0x0, 0x2e) [ 1847.081280] 9pnet: p9_fd_create_tcp (10534): problem connecting socket to 127.0.0.1 [ 1847.093121] 9pnet: p9_fd_create_tcp (10533): problem connecting socket to 127.0.0.1 [ 1847.107116] 9pnet: p9_fd_create_tcp (10536): problem connecting socket to 127.0.0.1 18:38:09 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0x0, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1847.117253] 9pnet: p9_fd_create_tcp (10532): problem connecting socket to 127.0.0.1 [ 1847.121884] 9pnet: p9_fd_create_tcp (10539): problem connecting socket to 127.0.0.1 18:38:09 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:09 executing program 1: r0 = perf_event_open(&(0x7f0000001800)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x1400}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0xa) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$int_in(r2, 0x5452, &(0x7f0000000040)=0x1) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x4300, 0x4) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x11, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x3}, 0x200000}], 0x7ffff000, 0x0) ftruncate(r0, 0x80000000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x810, r2, 0x8) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000000c0)) r3 = syz_mount_image$nfs(&(0x7f0000000140), &(0x7f0000000180)='./file1\x00', 0x3, 0x8, &(0x7f0000001680)=[{&(0x7f00000001c0)="957355f4101e56f1db97c1213ae942cf0fe7fb4609ba2c93acb0b8", 0x1b, 0x37a117f7}, {&(0x7f0000000200)="a83a387e0fea08be67824e59c056eef863f05ed373f3ab03c8ea8e029a2a68876ccc015c", 0x24, 0x3}, {&(0x7f0000000240)="2cea956ba505306b81cc1543f055b2a68710ecbbb1266df20f372f42dc45812a2e81c26c2bc6d0f12b91158cc4f316d834538ff901edf1f41bd34f141882128aa1e743a8832756a1c46562b97bb138efe5245e7910785caeeba5abfe7853412348c5cda3fda8b7cbe7ffcb8c579cc7a5553dae211ebf0eb9245d2cc1d3de3ae9e512ef8113a48d1cbe61156693a30d7542256233eedef48dd71eb5f4ce3a045b3702a2bf36c1fcbb96e65f1ebbfb374c6c4badde15d1a820bfa6358c6d70", 0xbe, 0x2}, {&(0x7f0000000300)="805287359e6c5ac6b0cca621b12eb9df47a78306f342ca6e201186f37cfb1638ed13", 0x22, 0x4}, {&(0x7f0000000340)="8aec39c8a323e5473f0d9fc2d4945d582b71a648a71e633a4ab5724f", 0x1c, 0xff}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000000380)="402dc341efcb5db01d94cacc70801e2c577da818b82d0c955e2e3e71600b525c065726d99c12c40fb9901a244ec0e90a74d52c0929a65818cebf4dd98d12aa5c6d04c16a5df4ad9a84e575e3bdbaa9b863c9626ccb48447b2f66acd78ebcc9177a5f8fa05b36f2c706f4c9fb8ad9020c1ea3e11b170452bb39262766470d34621ce2cdf4e4ca42d52de5f9e4fda3faf77860f66f3435d3c94a821fc09c07f511c58676023cb823578f372b7dc2edc54c5447f86a6b16c30cceec341bb07da5d546cb0e378140f2eefa709904385858848cc7866c71d0dc070ee1f8ab1223e9b12bef92f0c1e263cf245d15", 0xeb, 0x2}, {&(0x7f0000001580)="42aad5e988eb67bc6d288eb45a44fc6bd0bade5522e8e3e74de4a976eb7ed70dcf2b5773016314aa4439f5dd09de7d38195e824af79156b588c7567162cf7fba7bbd72c024ac2ec094f7357c097daba82e71fa8b7665d381482d68170b439e1cc0c860b8026d76d92b0e92e95bdcd82650c2f2529cec85f5b382dc5c361c0591ee76da7119a2ca9da4f9d1c4e4b2e40528dd12f5d3c623a365e74b7b3a13f5c2e47226efafad4fc5972c2c73af7ea727313e34c38d2c8c8b422c327e9ec523f42bcf5186a6a2b86a05", 0xc9, 0x6}], 0x22c000, &(0x7f0000001740)={[{'\x00'}, {'/-)'}, {'\x00'}, {'^:'}, {}, {'\x00'}, {'\x00'}], [{@hash}, {@appraise}, {@hash}, {@appraise}, {@pcr={'pcr', 0x3d, 0x1a}}, {@permit_directio}, {@uid_lt}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, '\x00'}}]}) ioctl$F2FS_IOC_FLUSH_DEVICE(r3, 0x4008f50a, &(0x7f0000000480)={0xf0, 0x7fffffff}) 18:38:09 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0x0, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:09 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x0, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:09 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 1847.242191] 9pnet: p9_fd_create_tcp (10547): problem connecting socket to 127.0.0.1 18:38:09 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1847.318698] 9pnet: p9_fd_create_tcp (10553): problem connecting socket to 127.0.0.1 [ 1847.326523] 9pnet: p9_fd_create_tcp (10552): problem connecting socket to 127.0.0.1 [ 1847.336228] 9pnet: p9_fd_create_tcp (10554): problem connecting socket to 127.0.0.1 18:38:09 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x248803, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x86) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, 0xffffffffffffffff, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1847.478273] 9pnet: p9_fd_create_tcp (10562): problem connecting socket to 127.0.0.1 [ 1847.570204] 9pnet: p9_fd_create_tcp (10570): problem connecting socket to 127.0.0.1 18:38:22 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:38:22 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x248803, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x86) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, 0xffffffffffffffff, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:22 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0x0, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:22 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x74, 0x0, 0x0, 0x2e) 18:38:22 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3875, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000300)={0x0, 0x1, 0x6, @remote}, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r3, 0x0}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) dup2(r0, r3) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x6000, @fd_index}, 0x80000001) r5 = syz_io_uring_setup(0x2203, &(0x7f00000002c0), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r8, 0x0, 0x0}, 0x0) r9 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r5, 0x0) syz_io_uring_submit(r9, r7, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x1ff, 0x3, &(0x7f00000004c0)=[{&(0x7f0000000340)="0812e5f984156a78a921f0febce3bdbde44be126df855d4b5779f62ba88f2efde64af0e1394c486adf01a6562a688e462fa53e18aa5e00016c31dc19b165b76c6603c57f2f7ea13da693011bc776ead64a9347c5ee4e877875c96a69770b455df6c9939604bdc4af490509b3d475e24fda0a5f9871b6681d56ea0ca850962940a255d32ed2a05365f6edd8886b868b94488dd9d02eee47a184392cbd948a7b5b23c69c3b99ab6aa9ee9398020e99e2c82805", 0xb2, 0x7df}, {&(0x7f0000000400)="d22ee6b4519d20b3050149d2dfbf105ed6f7856871d18bcd3b48552a5450f0675ead38d625b7968543db6fe31a28010b39b7b78b6cdf40e05e82b9f0c06c900ad54d4b6658ad70ed13abb0d4f52fe57e701b24b8e1fe43e0b275725cfe244e6122c3c9199aac8748c7a062c4dab78a96b944fba9fce48adcd54b0fdaa4bbbb7ac5134ef8295c42ea5b0f642043d06a412582a3d2fcfb41b2d6cf653b71ffcdad9ff0a38d53721a849d73c0dc7b53d7ffd2061086780fedc2aa03d912f42b9b", 0xbf, 0x8}, {&(0x7f0000000200)="4d6204380acb0d3846b71ca723ca1442", 0x10, 0x166}], 0x28010, &(0x7f0000000540)={[{@huge_within_size}, {@huge_within_size}, {@mpol={'mpol', 0x3d, {'prefer', '', @void}}}, {@huge_never}, {@mode={'mode', 0x3d, 0x8}}, {@nr_blocks={'nr_blocks', 0x3d, [0x78, 0x74, 0x38]}}, {@huge_within_size}, {@huge_never}, {@huge_within_size}], [{@smackfsroot={'smackfsroot', 0x3d, '(.$'}}, {@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}]}) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:38:22 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:22 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x0, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:22 executing program 1: syz_open_dev$vcsa(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r0, 0x0, 0x0, 0x1000002) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) syz_open_procfs(0x0, &(0x7f0000000700)='clear_refs\x00') r2 = syz_mount_image$msdos(&(0x7f0000000080), &(0x7f0000000140)='./file1\x00', 0xc4, 0x0, &(0x7f00000001c0), 0x1010000, &(0x7f0000000500)={[{@fat=@nfs}, {@fat=@errors_continue}, {@nodots}, {@fat=@dmask={'dmask', 0x3d, 0x7}}, {@fat=@usefree}, {@dots}, {@dots}, {@dots}, {@dots}], [{@subj_user={'subj_user', 0x3d, '\x00\x00\x00\x00\x00'}}, {@uid_gt={'uid>', 0xee00}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@smackfsfloor}, {@subj_role={'subj_role', 0x3d, '{:$\\'}}, {@euid_lt}, {@euid_eq={'euid', 0x3d, 0xee00}}]}) openat(r2, &(0x7f0000000240)='./file1\x00', 0x4000, 0x74) pipe(&(0x7f0000000040)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000180), 0x42808, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB, @ANYRESHEX, @ANYBLOB=',cache=mmap,\x00']) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x100000001) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) [ 1860.158232] 9pnet: p9_fd_create_tcp (10588): problem connecting socket to 127.0.0.1 [ 1860.173982] 9pnet: p9_fd_create_tcp (10591): problem connecting socket to 127.0.0.1 18:38:22 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x0, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1860.179972] 9pnet: p9_fd_create_tcp (10589): problem connecting socket to 127.0.0.1 [ 1860.201053] 9pnet: p9_fd_create_tcp (10586): problem connecting socket to 127.0.0.1 [ 1860.266976] loop3: detected capacity change from 0 to 3584 18:38:22 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x248803, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x86) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, 0xffffffffffffffff, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:22 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:38:22 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0x0, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:22 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1860.495659] 9pnet: p9_fd_create_tcp (10600): problem connecting socket to 127.0.0.1 18:38:22 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x0, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1860.583163] 9pnet: p9_fd_create_tcp (10610): problem connecting socket to 127.0.0.1 [ 1860.586957] 9pnet: p9_fd_create_tcp (10606): problem connecting socket to 127.0.0.1 [ 1860.597572] 9pnet: p9_fd_create_tcp (10608): problem connecting socket to 127.0.0.1 18:38:22 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1860.838951] 9pnet: p9_fd_create_tcp (10619): problem connecting socket to 127.0.0.1 [ 1860.852158] 9pnet: p9_fd_create_tcp (10618): problem connecting socket to 127.0.0.1 18:38:40 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x0, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:40 executing program 1: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x0, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:40 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:40 executing program 3: openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x224c0}, 0xfe8) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup(r2) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x30, r4, 0x325, 0x0, 0x0, {{0x32}, {@val={0x8, 0x67}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) sendmsg$IPSET_CMD_SWAP(r3, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x6, 0x6, 0x401, 0x0, 0x0, {0xaf4b964903dcd0a, 0x0, 0xa}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x40014}, 0x24000010) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x30, r5, 0x325, 0x0, 0x0, {{0x32}, {@val={0x8, 0x67}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x5c) 18:38:40 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:40 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0x0, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:40 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x7a, 0x0, 0x0, 0x2e) 18:38:40 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 1877.780993] 9pnet: p9_fd_create_tcp (10636): problem connecting socket to 127.0.0.1 [ 1877.832081] 9pnet: p9_fd_create_tcp (10638): problem connecting socket to 127.0.0.1 [ 1877.845217] 9pnet: p9_fd_create_tcp (10640): problem connecting socket to 127.0.0.1 [ 1877.850023] 9pnet: p9_fd_create_tcp (10639): problem connecting socket to 127.0.0.1 18:38:40 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:40 executing program 3: setuid(0xee00) r0 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in=@empty, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) setuid(r0) 18:38:40 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0x0, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1877.890223] 9pnet: p9_fd_create_tcp (10642): problem connecting socket to 127.0.0.1 18:38:40 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:40 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x0, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:40 executing program 1: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x0, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1878.017787] 9pnet: p9_fd_create_tcp (10657): problem connecting socket to 127.0.0.1 18:38:40 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:38:40 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:40 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1878.138228] 9pnet: p9_fd_create_tcp (10665): problem connecting socket to 127.0.0.1 [ 1878.161754] 9pnet: p9_fd_create_tcp (10664): problem connecting socket to 127.0.0.1 [ 1878.166847] 9pnet: p9_fd_create_tcp (10663): problem connecting socket to 127.0.0.1 18:38:40 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1878.246250] 9pnet: p9_fd_create_tcp (10673): problem connecting socket to 127.0.0.1 [ 1878.261139] 9pnet: p9_fd_create_tcp (10675): problem connecting socket to 127.0.0.1 [ 1878.264907] 9pnet: p9_fd_create_tcp (10676): problem connecting socket to 127.0.0.1 [ 1878.411251] 9pnet: p9_fd_create_tcp (10683): problem connecting socket to 127.0.0.1 18:38:55 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x0, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:55 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:55 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x228000, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r2, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="ef000000de0998d7", @ANYRES16=r1, @ANYBLOB="1d862dbd7000fedbdf254400000008000300", @ANYRES32=0x0, @ANYBLOB="0400cc001a002400608609048386010186ee06a4093683980305890209ec0000050019010b00000008002201d9020000080027000200000005001901060000000800220129010000080027000300000008002700020000000800a000010000000500180136000000050018010e00000008002600251700000800a0000104000008002700010000000800a10000000000080022011e03000008002700000000000800a1007f000000080026006c0900000500190104000000"], 0xd4}}, 0x4000) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001600)=ANY=[@ANYBLOB="24009830", @ANYRES16=r1, @ANYBLOB="290300000000000000000500"], 0x28}}, 0x0) r3 = eventfd(0x0) dup2(r3, r0) creat(&(0x7f0000000100)='./file0\x00', 0x40) 18:38:55 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:38:55 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x8e, 0x0, 0x0, 0x2e) 18:38:55 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0x0, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0xffffff27, r2, 0x200, 0x0, 0x25dfdbfd, {{0x32}, {@void, @val={0x8}, @val={0xffd0, 0x99, {0x200000}}}}}, 0x30}}, 0x4080) mkdirat(r1, &(0x7f0000000080)='./file1\x00', 0x8) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000380), r5) sendmsg$NLBL_MGMT_C_ADDDEF(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, r6, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_PROTOCOL={0x8}]}, 0x24}}, 0x0) sendmsg$NLBL_MGMT_C_ADD(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r6, 0x200, 0x70bd26, 0x25dfdbff, {}, [@NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0xffffffffffffffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) [ 1893.640255] 9pnet: p9_fd_create_tcp (10697): problem connecting socket to 127.0.0.1 [ 1893.662014] 9pnet: p9_fd_create_tcp (10698): problem connecting socket to 127.0.0.1 18:38:55 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000012c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x3, 0x1, 0x3, 0x3, 0x1ff}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000017c0)={{0x2, 0x0, 0x8}}) [ 1893.672844] 9pnet: p9_fd_create_tcp (10704): problem connecting socket to 127.0.0.1 [ 1893.691155] 9pnet: p9_fd_create_tcp (10700): problem connecting socket to 127.0.0.1 18:38:56 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x0, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:56 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:56 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:56 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x0, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:38:56 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 1893.864904] 9pnet: p9_fd_create_tcp (10715): problem connecting socket to 127.0.0.1 [ 1893.968597] 9pnet: p9_fd_create_tcp (10721): problem connecting socket to 127.0.0.1 [ 1894.007142] 9pnet: p9_fd_create_tcp (10722): problem connecting socket to 127.0.0.1 [ 1894.069801] 9pnet: p9_fd_create_tcp (10726): problem connecting socket to 127.0.0.1 18:39:09 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:39:09 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:39:09 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x300, 0x0, 0x0, 0x2e) 18:39:09 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000040)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:39:09 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup(r1) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) setsockopt$inet6_udp_int(r4, 0x11, 0xa, &(0x7f0000000000), 0x4) socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x4e21, @remote}, 0x10) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000100)=[r0, r1, 0xffffffffffffffff, r2, r0, r4], 0x6) fallocate(0xffffffffffffffff, 0x8, 0x0, 0x8000) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = dup3(r2, r4, 0x0) connect$inet(r6, &(0x7f0000000400)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2d}}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="14aaad21326d07ec238000000000b904421383398ae54c310fd319bddab2559e2416a35e6200000000000063df0000"], 0x14}}, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syncfs(r5) openat(r4, &(0x7f0000000140)='./file2\x00', 0x440, 0xa1) 18:39:09 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x0, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:39:09 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x0, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:39:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MCAST_RATE(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20002000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, r1, 0x4, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x9, 0x6a}}}}, [@NL80211_ATTR_MCAST_RATE={0x8}]}, 0x28}}, 0x4040040) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r2, 0x2ff, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0xb}]}, 0x24}}, 0x0) syz_80211_join_ibss(&(0x7f0000000080)='wlan1\x00', 0x0, 0xf, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NL80211_CMD_GET_POWER_SAVE(r4, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r2, 0x300, 0x70bd27, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x1, 0x34}}}}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x40800) [ 1907.010744] 9pnet: p9_fd_create_tcp (10746): problem connecting socket to 127.0.0.1 [ 1907.019211] 9pnet: p9_fd_create_tcp (10747): problem connecting socket to 127.0.0.1 [ 1907.026784] 9pnet: p9_fd_create_tcp (10748): problem connecting socket to 127.0.0.1 [ 1907.031813] 9pnet: p9_fd_create_tcp (10749): problem connecting socket to 127.0.0.1 18:39:09 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x0, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:39:09 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x0, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:39:09 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000040)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:39:09 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:39:09 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:39:09 executing program 3: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x0, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1907.264881] 9pnet: p9_fd_create_tcp (10764): problem connecting socket to 127.0.0.1 18:39:09 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x1b) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r0}, {r1, 0x503}], 0x2, 0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x3, 0x6, &(0x7f0000000400)=[{&(0x7f0000000140)="417f3b08c01acb7c5cc8da8cff8daf02896efa681fd674475495c89bd7a85c2067004ce5fa34eb31144f02b8bda35218e3c94838408f", 0x36, 0x8}, {&(0x7f0000000180)="77cb9ce8a6d98d8d81a6ef0b9ec3a7a8d1e51846d546edd6704ef944", 0x1c, 0x8}, {&(0x7f00000001c0)="80ea5cab7c1914d77206", 0xa, 0x3ff}, {&(0x7f0000000200)="70e85baf216f5cae7b30e4e56529aa9dec049b5b28916f84a3cb5d31810d27eb7fa2f5a66858e510afbb6121671b532068e6ae6144e53ce916be6232f17593800307bc", 0x43, 0x1}, {&(0x7f0000000280)="e415c9025ec721f47c44f4f985f1f04522f9a2c487f9c06de4bb969843e8204b0fc9db937a0d135b1e3d0483ea421bf9a0875f58fba43272a7801489304c7cb60d46e75699d35734d549f20ddbc93182e44952ce345049596bf3ef056f133d1643cf625dec5c4e5f2c5cede8101c00bb5931757ab06e324086fc02d1c75e7cacd5a15f4618ba6c6776", 0x89}, {&(0x7f0000000340)="851a65ceeb2d7c94305ee1cf2d5c4f49ec8718d46c42172785f75c72bcbad9e8e622b72847ccf5ec9903f3e10addacbafa4e23df6bdcf266c6c4be7a5596f4288dc5f97458adf98555ea10eaca6765007d656f22d396de552049f5b8a7ab1547790425c09fd801333b8ed4293c13e77b49fce682180306bb037a7f4f5ac5e1562e02353a9fcc5d896d94be3b036f5a4e56df9c6ebff64cdd", 0x98, 0x7}], 0x800000, &(0x7f00000004c0)={[{@map_normal}, {@map_acorn}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {}, {@mode={'mode', 0x3d, 0xfffffffffffffffd}}, {@gid={'gid', 0x3d, 0xee01}}, {@utf8}, {@overriderock}, {@mode={'mode', 0x3d, 0x9}}, {@cruft}], [{@context={'context', 0x3d, 'staff_u'}}, {@uid_eq}]}) 18:39:09 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x0, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1907.373228] 9pnet: p9_fd_create_tcp (10765): problem connecting socket to 127.0.0.1 [ 1907.443171] 9pnet: p9_fd_create_tcp (10773): problem connecting socket to 127.0.0.1 [ 1907.459980] 9pnet: p9_fd_create_tcp (10775): problem connecting socket to 127.0.0.1 [ 1907.472141] 9pnet: p9_fd_create_tcp (10774): problem connecting socket to 127.0.0.1 18:39:09 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:39:09 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1907.612626] 9pnet: p9_fd_create_tcp (10783): problem connecting socket to 127.0.0.1 [ 1907.707668] 9pnet: p9_fd_create_tcp (10789): problem connecting socket to 127.0.0.1 [ 1907.739773] 9pnet: p9_fd_create_tcp (10790): problem connecting socket to 127.0.0.1 18:39:22 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0xa, 0x4e24, 0x7, @loopback, 0x6}, 0x1c, &(0x7f0000000180)=[{&(0x7f0000000040)="f3ee9760acbaa9a9b95c", 0xa}, {&(0x7f0000000080)="1087ced562ed9ccc4bf13a579182450789b7752dc72ad8cb1842e3c39a500c1232ec27a31c828c339ff9fc43b26cf329ae9f4ee63a7b2b45f5afad710f37e595ab4469c16c4fa41a8e3dade4b88c3d83850f1c4b541a471201da4aed31cd0c360630c589ec616a24e9dbfdd6f5c63b932be0d88bd1f9e496262dbfa73ab87fd7edc35a3f994183d0a6d9973208b91143491c4ded4b4ca6b54982080d38c56a0eaaf3fba519e1c89871cf34df57eece37985469558c3a9b4abf6447dd91cc193c2034d866d671ec99ef9eb0d2638ee6476106c04543f7734631ab6af9add4ffebd742f08b5d83d1a88bdd4339dec6", 0xee}], 0x2, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/443], 0x1b8}, 0x8000) 18:39:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) pipe2(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) epoll_create1(0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) epoll_create(0x3ff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x8}, 0x0, 0x5, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r1, 0x3b5c, 0x2) r2 = syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x2, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="2e28a32c04b0143c98c45f2436e117cc94a0cb7f526074fb9f5f566053451699d578da1b39172e7fc4ed01bf20c38e3bb08a8d7f059ff4bb50931749c9c3d3d1d64b356f6333cc413cff10f8d8982430af56d3135393a6edbd89daa251b3bfa5981c82e7725437b211a4ab2f79ccf6ac38245df8c497f5b00a64891d776fdd49f273f2ef1d06562a651743ae2737a07f60c96d5cf1a1c1a531e4b7912c78755a", 0xa0, 0x57}], 0xa90810, &(0x7f0000000280)={[{@fat=@debug}, {@rodir}, {@uni_xlateno}, {@shortname_lower}, {@utf8}], [{@smackfsfloor}, {@subj_role={'subj_role', 0x3d, '\\-)*o'}}, {@dont_appraise}]}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f00000000c0)={0x20002013}) 18:39:22 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:39:22 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:39:22 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:39:22 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000040)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:39:22 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x0, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:39:22 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x500, 0x0, 0x0, 0x2e) [ 1920.725961] 9pnet: p9_fd_create_tcp (10815): problem connecting socket to 127.0.0.1 [ 1920.727946] 9pnet: p9_fd_create_tcp (10809): problem connecting socket to 127.0.0.1 [ 1920.735952] 9pnet: p9_fd_create_tcp (10811): problem connecting socket to 127.0.0.1 [ 1920.756886] 9pnet: p9_fd_create_tcp (10812): problem connecting socket to 127.0.0.1 18:39:23 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:39:23 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:39:23 executing program 1: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000500)="20000000800000000600ac39d5566900000000c4309f5841e8653a6a0000000f0000003d39b6054446000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f00000000000000000199dc562973c7bd95b8c8820000", 0x6f, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4", 0x93, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r2 = dup2(r1, r0) openat(r2, &(0x7f00000002c0)='./file1\x00', 0x80000, 0x95) ftruncate(0xffffffffffffffff, 0x8001) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x44, 0x0, 0x800, 0x70bd2b, 0x25dfdbfc, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x3}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x70000000}, @BATADV_ATTR_ISOLATION_MARK={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x57}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000010}, 0x1) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) r4 = gettid() syz_open_procfs(r4, &(0x7f0000000400)='net/udp6\x00') pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/zoneinfo\x00', 0x0, 0x0) pipe2(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) linkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x400) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4000) ioctl$int_in(r5, 0x5421, &(0x7f00000000c0)) 18:39:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000002, 0x100010, 0xffffffffffffffff, 0x8000000) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x4000010, 0xffffffffffffffff, 0x10000000) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x5, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x1, r3}}, 0x10001) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x3, 0x4004, @fd=r0, 0x8, 0x0, 0x0, 0xd, 0x0, {0x3, r3}}, 0xffffffff) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000002400210900000080000200001b0500000400000000000000", @ANYRES32], 0x2c}}, 0x0) 18:39:23 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:39:23 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x0, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:39:23 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:39:23 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x600, 0x0, 0x0, 0x2e) [ 1920.968171] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1920.994668] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1921.071630] 9pnet: p9_fd_create_tcp (10838): problem connecting socket to 127.0.0.1 [ 1921.079742] 9pnet: p9_fd_create_tcp (10832): problem connecting socket to 127.0.0.1 [ 1921.105986] 9pnet: p9_fd_create_tcp (10841): problem connecting socket to 127.0.0.1 [ 1921.120973] 9pnet: p9_fd_create_tcp (10840): problem connecting socket to 127.0.0.1 18:39:36 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x700, 0x0, 0x0, 0x2e) 18:39:36 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:39:36 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:39:36 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(0x0, 0x0) 18:39:36 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:39:36 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:39:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) r2 = dup(r1) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f0000000000)=0x1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r3) sendmsg$NBD_CMD_RECONFIGURE(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400}, 0x20004081) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={0x50, 0x1, 0x2, 0x401, 0x0, 0x0, {0xa}, [@CTA_EXPECT_MASTER={0x3c, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @empty}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}]}, 0x50}}, 0x0) 18:39:36 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_io_uring_setup(0x498e, &(0x7f00000006c0), &(0x7f00000a0000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f00000003c0)=0x0, &(0x7f0000000000)=0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000340)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0, 0xc6da2cc48daca113}, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000000000)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd_index=0xa, 0x0, 0x0, 0x62, 0x3}, 0x9) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) syz_io_uring_setup(0x1db5, &(0x7f0000000080)={0x0, 0xbd2c, 0x1, 0x1, 0x9e, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x5, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x1, r6}}, 0x10001) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = dup(r7) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x30, r9, 0x325, 0x0, 0x0, {{0x32}, {@val={0x8, 0x67}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000000, 0x11, r8, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000200)=@IORING_OP_OPENAT2={0x1c, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)={0x349001, 0x10}, &(0x7f00000001c0)='./file0\x00', 0x18, 0x0, 0x12345, {0x0, r6}}, 0x10001) sendmmsg$inet(r0, &(0x7f0000004600)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="5604000000"], 0x10}}], 0x2, 0x0) [ 1934.027256] 9pnet: p9_fd_create_tcp (10858): problem connecting socket to 127.0.0.1 [ 1934.071797] 9pnet: p9_fd_create_tcp (10865): problem connecting socket to 127.0.0.1 18:39:36 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1934.100193] 9pnet: p9_fd_create_tcp (10866): problem connecting socket to 127.0.0.1 [ 1934.109935] 9pnet: p9_fd_create_tcp (10867): problem connecting socket to 127.0.0.1 18:39:36 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(0x0, 0x0) 18:39:36 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:39:36 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:39:36 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1934.347227] 9pnet: p9_fd_create_tcp (10877): problem connecting socket to 127.0.0.1 18:39:36 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() setpriority(0x0, r0, 0x0) getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x30, 0x10, 0x1, 0x6, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x11, 0x0, 0x0, 0x1, [@generic="487fec864b245e0f3f9be149f8"]}]}, 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r4, 0x3, &(0x7f00000000c0)={0x3, 0x9}, &(0x7f0000000100)) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000005c0), 0xc, &(0x7f0000000240)={&(0x7f0000000700)=ANY=[@ANYRES16=r3, @ANYBLOB="010029bd7000fcdbdf25040000004404004e24000014000300000000000000000000000000000000000c0007003000000004000000080005000400000008000b0e73697020060002005a00000038000280060002004e2100000800090000000000080006f54f00000014000100e000000200000000000000000000000008000900090000001c00038008000300000000000800010001000000080001000200000008000400200000004c000280080006000300000005000d00010000000800050005001c283171ff89dee001000800070086000000080009007c000000080004000900000006000f0002000078e00006000b000a00"], 0x100}, 0x1, 0x0, 0x0, 0x4804}, 0x44) r5 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) clone3(&(0x7f0000000440)={0x100000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f00000002c0), {0x27}, &(0x7f0000000300)=""/45, 0x2d, &(0x7f0000000340)=""/187, &(0x7f0000000400)=[r4, r0, 0x0], 0x3}, 0x58) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x50, r3, 0x100, 0x0, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xcd}]}, 0x50}, 0x1, 0x0, 0x0, 0x800}, 0x4000) unshare(0x48020200) 18:39:36 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(0xffffffffffffffff) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1934.476180] 9pnet: p9_fd_create_tcp (10883): problem connecting socket to 127.0.0.1 [ 1934.490225] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1934.495874] 9pnet: p9_fd_create_tcp (10886): problem connecting socket to 127.0.0.1 [ 1934.498846] 9pnet: p9_fd_create_tcp (10885): problem connecting socket to 127.0.0.1 18:39:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00, 0xee00}}, './file0\x00'}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x1) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x4300, 0x4) sendmmsg$inet6(r3, &(0x7f0000004d00)=[{{0x0, 0x11, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x3}, 0x200000}], 0x7ffff000, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESHEX=r2, @ANYRESHEX, @ANYRESOCT, @ANYRESHEX, @ANYRES32=r2, @ANYRES32=r3]) r4 = socket$netlink(0x10, 0x3, 0xe) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000240)={{0x1, 0x1, 0x18, r4, {0x886d}}, './file0\x00'}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYRESDEC], 0x24}, 0x1, 0x0, 0x0, 0x40014}, 0x44000) r6 = dup(r0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000100)={0x5, 0x4, 0x7fff, 0xffff0001, 0x87c5}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000500)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r1}}, './file0\x00'}) r7 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r7) dup(0xffffffffffffffff) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000280)={0x101, 0x3, 0xfffffffc, 0x80000, 0x8}) pread64(0xffffffffffffffff, &(0x7f0000000000)=""/23, 0x17, 0x66) syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 1934.599762] 9pnet: p9_fd_create_tcp (10895): problem connecting socket to 127.0.0.1 [ 1934.887820] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 18:39:57 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(0x0, 0x0) 18:39:57 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xa00, 0x0, 0x0, 0x2e) 18:39:57 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:39:57 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r4]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:39:57 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(0xffffffffffffffff) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:39:57 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() setpriority(0x0, r0, 0x0) getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x30, 0x10, 0x1, 0x6, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x11, 0x0, 0x0, 0x1, [@generic="487fec864b245e0f3f9be149f8"]}]}, 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) prlimit64(r4, 0x3, &(0x7f00000000c0)={0x3, 0x9}, &(0x7f0000000100)) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000005c0), 0xc, &(0x7f0000000240)={&(0x7f0000000700)=ANY=[@ANYRES16=r3, @ANYBLOB="010029bd7000fcdbdf25040000004404004e24000014000300000000000000000000000000000000000c0007003000000004000000080005000400000008000b0e73697020060002005a00000038000280060002004e2100000800090000000000080006f54f00000014000100e000000200000000000000000000000008000900090000001c00038008000300000000000800010001000000080001000200000008000400200000004c000280080006000300000005000d00010000000800050005001c283171ff89dee001000800070086000000080009007c000000080004000900000006000f0002000078e00006000b000a00"], 0x100}, 0x1, 0x0, 0x0, 0x4804}, 0x44) r5 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r5, 0x0) clone3(&(0x7f0000000440)={0x100000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f00000002c0), {0x27}, &(0x7f0000000300)=""/45, 0x2d, &(0x7f0000000340)=""/187, &(0x7f0000000400)=[r4, r0, 0x0], 0x3}, 0x58) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x50, r3, 0x100, 0x0, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xcd}]}, 0x50}, 0x1, 0x0, 0x0, 0x800}, 0x4000) unshare(0x48020200) 18:39:57 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/shm\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000003c0)=""/4111, 0x100f}], 0x1, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup(r2) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x30, r4, 0x8, 0x0, 0x0, {{0x32}, {@val={0x8, 0x67}, @val={0x8}, @val={0xc, 0x99, {0x0, 0xffffffff}}}}}, 0x30}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r2) recvmsg$unix(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/241, 0xf1}, {&(0x7f0000000000)=""/60, 0x3c}, {&(0x7f00000001c0)=""/250, 0xfa}, {&(0x7f00000002c0)=""/33, 0x21}], 0x4, &(0x7f0000001400)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xf8}, 0x100) 18:39:57 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1954.862711] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1954.892030] 9pnet: p9_fd_create_tcp (10921): problem connecting socket to 127.0.0.1 [ 1954.910172] 9pnet: p9_fd_create_tcp (10923): problem connecting socket to 127.0.0.1 18:39:57 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1954.920284] 9pnet: p9_fd_create_tcp (10925): problem connecting socket to 127.0.0.1 [ 1954.922145] 9pnet: p9_fd_create_tcp (10924): problem connecting socket to 127.0.0.1 18:39:57 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:39:57 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:39:57 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r4]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:39:57 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(0xffffffffffffffff) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1955.038594] 9pnet: p9_fd_create_tcp (10931): problem connecting socket to 127.0.0.1 18:39:57 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1955.081195] 9pnet: p9_fd_create_tcp (10935): problem connecting socket to 127.0.0.1 18:39:57 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1955.096668] 9pnet: p9_fd_create_tcp (10936): problem connecting socket to 127.0.0.1 [ 1955.152413] 9pnet: p9_fd_create_tcp (10942): problem connecting socket to 127.0.0.1 18:39:57 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(0x0, 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1955.211514] 9pnet: p9_fd_create_tcp (10945): problem connecting socket to 127.0.0.1 18:39:57 executing program 3: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1955.240072] 9pnet: p9_fd_create_tcp (10948): problem connecting socket to 127.0.0.1 [ 1955.264215] 9pnet: p9_fd_create_tcp (10952): problem connecting socket to 127.0.0.1 [ 1955.292757] 9pnet: p9_fd_create_tcp (10953): problem connecting socket to 127.0.0.1 18:40:13 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:40:13 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:40:13 executing program 1: ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000080)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000180)=@sco={0x1f, @none}}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)={0xd4, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x20, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast2}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x24}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @multicast2}, @CTA_NAT_PROTO={0x4c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e24}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e20}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @remote}]}]}, 0xd4}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="0900d0e635f4ab5058a2b380b4f6c7", @ANYRES16=r3, @ANYBLOB="050000000000000000000600000008000300", @ANYRES32=r4, @ANYBLOB="0800050002000000"], 0x24}}, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r0, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="432deb6a", @ANYRES16=r3, @ANYBLOB="08002cbd7000fcdbdf254c0000000c00990005000000180000000c00580076000000000000000c00580028000000000000000c0058000d000000000000000c0058005f00000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x4044000}, 0x8000) sendmsg$nl_generic(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)={0x1c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@generic="0000af0180"]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_MCAST_RATE(r6, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000ec0)={&(0x7f00000000c0)={0x24, r7, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r8}, @void}}, [@NL80211_ATTR_MCAST_RATE={0x8}]}, 0x24}}, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000380), 0x10) 18:40:13 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc00, 0x0, 0x0, 0x2e) 18:40:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r4]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:40:13 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:40:13 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x21000, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x1) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x4300, 0x4) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x11, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x3}, 0x200000}], 0x7ffff000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f00000002c0)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000000)=ANY=[@ANYRES16]) 18:40:13 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(0x0, 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1971.236136] 9pnet: p9_fd_create_tcp (10975): problem connecting socket to 127.0.0.1 [ 1971.247771] 9pnet: p9_fd_create_tcp (10974): problem connecting socket to 127.0.0.1 18:40:13 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1971.305127] 9pnet: p9_fd_create_tcp (10981): problem connecting socket to 127.0.0.1 [ 1971.326904] 9pnet: p9_fd_create_tcp (10978): problem connecting socket to 127.0.0.1 18:40:13 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(0x0, 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:40:13 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:40:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:40:13 executing program 1: perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f0000000040)) 18:40:13 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1971.556133] 9pnet: p9_fd_create_tcp (10989): problem connecting socket to 127.0.0.1 [ 1971.633656] 9pnet: p9_fd_create_tcp (11002): problem connecting socket to 127.0.0.1 18:40:13 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1971.640875] 9pnet: p9_fd_create_tcp (10995): problem connecting socket to 127.0.0.1 [ 1971.647250] 9pnet: p9_fd_create_tcp (10996): problem connecting socket to 127.0.0.1 18:40:13 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x1, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000001780)=""/251, 0xfb}, {&(0x7f0000001880)=""/102, 0x66}, {&(0x7f0000001900)=""/130, 0x82}, {&(0x7f00000019c0)=""/95, 0x5f}], 0x4) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001a40)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r1, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) fsetxattr$security_selinux(r2, &(0x7f0000000240), &(0x7f00000002c0)='system_u:object_r:dlm_control_device_t:s0\x00', 0x2a, 0x6a4e5309ea842515) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000200)={0x7, 0x21, 0x1}, 0x7) openat$bsg(0xffffffffffffff9c, &(0x7f00000014c0), 0x103, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) r3 = dup(0xffffffffffffffff) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x30, r4, 0x325, 0x0, 0x0, {{0x32}, {@val={0x8, 0x67}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r3, 0x5385, &(0x7f0000001640)={0xe1, ""/225}) unshare(0x48020200) 18:40:14 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1971.821192] 9pnet: p9_fd_create_tcp (11012): problem connecting socket to 127.0.0.1 [ 1971.830969] 9pnet: p9_fd_create_tcp (11010): problem connecting socket to 127.0.0.1 18:40:27 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:40:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_PMK(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x50, 0x0, 0x100, 0x70bd29, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x7, 0x3d}}}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x50}, 0x1, 0x0, 0x0, 0x48000}, 0x20000000) syz_io_uring_setup(0x6ba4, &(0x7f00000001c0)={0x0, 0x628a, 0x1, 0x3, 0x2d4}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x498e, &(0x7f00000006c0), &(0x7f00000a0000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f00000003c0)=0x0, &(0x7f0000000000)=0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000340)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r5, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0, 0xc6da2cc48daca113}, 0x0) syz_io_uring_submit(r2, r4, &(0x7f0000000340)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd=r1, 0x1, 0x0, 0x857, 0x4, 0x1}, 0x80000000) ftruncate(r0, 0x1000003) dup2(r0, r1) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) ioctl$EXT4_IOC_GET_ES_CACHE(r1, 0xc020662a, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x0, 0x1, [{}]}) 18:40:27 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup(r1) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x30, r3, 0x325, 0x0, 0x0, {{0x32}, {@val={0x8, 0x67}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r2) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000080)='system_u:object_r:sulogin_exec_t:s0\x00', 0xf, 0x0) r5 = openat2(r0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x240040, 0x20, 0xb}, 0x18) sendmsg$SEG6_CMD_SET_TUNSRC(r5, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x4c, r4, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x9, 0x1000, 0x449]}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x7f]}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x3ff, 0x4]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x32}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4001}, 0x10) 18:40:27 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:40:27 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:40:27 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) (fail_nth: 1) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:40:27 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x1200, 0x0, 0x0, 0x2e) 18:40:27 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x0) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1985.305300] SELinux: Context system_u:object is not valid (left unmapped). [ 1985.310644] 9pnet: p9_fd_create_tcp (11037): problem connecting socket to 127.0.0.1 [ 1985.314922] FAULT_INJECTION: forcing a failure. [ 1985.314922] name failslab, interval 1, probability 0, space 0, times 0 [ 1985.318053] CPU: 0 PID: 11036 Comm: syz-executor.5 Not tainted 5.10.234 #1 [ 1985.319581] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1985.321377] Call Trace: [ 1985.321957] dump_stack+0x107/0x167 [ 1985.322749] should_fail.cold+0x5/0xa [ 1985.323558] ? kvmalloc_node+0x119/0x170 [ 1985.324423] should_failslab+0x5/0x20 [ 1985.325251] __kmalloc_node+0x76/0x420 [ 1985.326089] ? __lock_acquire+0xbb1/0x5b00 [ 1985.327010] kvmalloc_node+0x119/0x170 [ 1985.327848] seq_read_iter+0x9d6/0x12b0 [ 1985.328705] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1985.329858] proc_reg_read_iter+0x20a/0x2e0 [ 1985.330802] new_sync_read+0x424/0x6f0 [ 1985.331645] ? ksys_lseek+0x1b0/0x1b0 [ 1985.332532] ? fsnotify_perm.part.0+0x22d/0x620 [ 1985.333541] ? security_file_permission+0xb1/0xe0 [ 1985.334589] vfs_read+0x4da/0x620 [ 1985.335349] __x64_sys_pread64+0x201/0x260 [ 1985.336255] ? ksys_pread64+0x1b0/0x1b0 [ 1985.337122] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1985.338240] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1985.339353] do_syscall_64+0x33/0x40 [ 1985.340157] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1985.341262] RIP: 0033:0x7f229c9c2b19 [ 1985.342064] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1985.346031] RSP: 002b:00007f2299f38188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 1985.347681] RAX: ffffffffffffffda RBX: 00007f229cad5f60 RCX: 00007f229c9c2b19 [ 1985.349215] RDX: 0000000000000053 RSI: 0000000020000240 RDI: 0000000000000004 [ 1985.350772] RBP: 00007f2299f381d0 R08: 0000000000000000 R09: 0000000000000000 [ 1985.352297] R10: 0000000200000048 R11: 0000000000000246 R12: 0000000000000001 [ 1985.353852] R13: 00007fff187a792f R14: 00007f2299f38300 R15: 0000000000022000 [ 1985.359198] 9pnet: p9_fd_create_tcp (11043): problem connecting socket to 127.0.0.1 18:40:27 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x0) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1985.378369] 9pnet: p9_fd_create_tcp (11041): problem connecting socket to 127.0.0.1 18:40:27 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) (fail_nth: 2) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1985.398982] 9pnet: p9_fd_create_tcp (11034): problem connecting socket to 127.0.0.1 18:40:27 executing program 1: r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000040)=""/240) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000140)={0x0, "b280a8aad0bcabe24c2338bb4e22637b"}) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000001140)={0x0, 0x2, {0x7, @usage=0x1, 0x0, 0xbd9, 0x4, 0x4, 0x2, 0x4, 0xac, @struct={0x45, 0x9}, 0x1, 0x6, [0x3, 0x7, 0x7f, 0x81, 0xffffffffffffff80, 0x1]}, {0x10000, @struct={0x9, 0x10000}, 0x0, 0xaa, 0x27, 0x100000001, 0x8, 0x2, 0x0, @usage=0x200, 0x1, 0x20, [0xeb00, 0x8000, 0x4, 0xd6e, 0x4, 0x200]}, {0x7, @usage=0x69058258, r1, 0x1000, 0x1ff, 0x6, 0x8, 0x9, 0x800, @struct={0x0, 0x8}, 0x8, 0x0, [0x6, 0x4, 0x5314, 0x8, 0x5, 0xfff]}, {0xa79a, 0x401, 0x6}}) r2 = accept4$inet(r0, &(0x7f0000001540)={0x2, 0x0, @private}, &(0x7f0000001580)=0x10, 0x80000) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f00000015c0)) connect$inet(0xffffffffffffffff, &(0x7f0000001600)={0x2, 0x4e23, @multicast1}, 0x10) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000001640), 0xc001, 0x0) write$binfmt_elf64(r3, &(0x7f0000001680)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x86, 0x4, 0x1, 0x7e10, 0x3, 0x3e, 0x0, 0x6a, 0x40, 0x2ec, 0x8, 0x5, 0x38, 0x1, 0x5, 0x9, 0x8}, [{0x0, 0x0, 0x401, 0x2, 0x3, 0xffffffffffffffe0, 0x1ff, 0x5}, {0x1, 0x2, 0x4, 0xd09, 0x1, 0x0, 0x3, 0x7}], "", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xab0) ftruncate(r3, 0x7) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r3, 0xc018937e, &(0x7f0000002140)={{0x1, 0x1, 0x18, r2, @out_args}, './file0\x00'}) ftruncate(r4, 0xfa) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000002180)={'veth1_macvtap\x00'}) fcntl$setflags(r2, 0x2, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000021c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_timeval(r6, 0x1, 0x15, &(0x7f0000002200), &(0x7f0000002240)=0x10) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000002280)={@in={{0x2, 0x4e23, @loopback}}, 0x0, 0x0, 0x38, 0x0, "143b41a222b176ddba3a252275d748d9e267214ef63cd63103a28bf049c907e3d5815b2d83755aaf47c66f225deead0642c0a968cfdafddf322e894ca6fd06896dda1d45d7968d6cce9f98f736c1346a"}, 0xd8) recvmsg$unix(r5, &(0x7f0000002980)={&(0x7f0000002600)=@abs, 0x6e, &(0x7f0000002840)=[{&(0x7f0000002680)=""/175, 0xaf}, {&(0x7f0000002740)=""/249, 0xf9}], 0x2, &(0x7f0000002880)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd8}, 0x10) ioctl$TIOCGSID(r4, 0x5429, &(0x7f00000029c0)=0x0) sendmsg$unix(r0, &(0x7f0000002c80)={&(0x7f0000002380)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000025c0)=[{&(0x7f0000002400)="b81cd0ed2b5c2684e565e2a4dbfa5fcdc376fcae5857d32d2b998b14f5a3845c453d7091cc3c416af07fc3c60745c362249ef15fca534401542de0e61f239e6a2a2e7f6c1c911c69d1b83887efcb9e76764b57fe13a178d8c9f4d72a691f715eb1143c22202105de265e715cf8088b8779ab9ec1d872f4f54171a286550f00ebfbc731e4f48b5ce0d00f8465f55ca6256b3c31caff93dcd5fa78abe1e06d1cb549a0cc5f78ba8e1729d58092f93c", 0xae}, {&(0x7f00000024c0)="0175fede8a7c9ac1e451060df01968a441aac164daeed4778eb836a63f19d8d8320d28cc502c35f11d6fa5c6c6d32c03063ebb3e3328a8df7e79b4fa6834cc377cd57c5abf4080033cdf6c05cd11b5fcabfb11f5dd010a4efbd528c89baaf37ad0811b885b0bf3a29534cb84a04696fe9c7c05ad323581ad6cc8559aeb4ce78284ad3700216fbfe6f2bb2cc5f91e24643b09cfdd54307d30f61d8feae4550e7901322d29682329e7e140414d855275954f773ebfe9377da56bc586c12fb12e27980fbcb8a8c46169311794bcdf8653dc41b6982bde3e18a6f813344e6b0203edf7b1cbc44510d99e5a393cee3499d4a5dcb9ac7d74e1000e", 0xf8}], 0x2, &(0x7f0000002c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r7}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0x0, 0xee00}}}, @rights={{0x1c, 0x1, 0x1, [r3, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x60, 0x20000044}, 0x0) 18:40:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = signalfd(r0, &(0x7f0000001500), 0x8) dup2(r0, r1) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=@updsa={0x158, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@private2, 0x0, 0x33}, @in=@remote, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}, @encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@remote}}]}, 0x158}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup(r2) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x30, r4, 0x325, 0x0, 0x0, {{0x32}, {@val={0x8, 0x67}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) sendmsg$NFT_MSG_GETTABLE(r3, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, 0x1, 0xa, 0x101, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4040010}, 0x4000) 18:40:27 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 1985.525677] FAULT_INJECTION: forcing a failure. [ 1985.525677] name failslab, interval 1, probability 0, space 0, times 0 [ 1985.526997] CPU: 1 PID: 11054 Comm: syz-executor.5 Not tainted 5.10.234 #1 [ 1985.527960] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1985.529134] Call Trace: [ 1985.529511] dump_stack+0x107/0x167 [ 1985.530028] should_fail.cold+0x5/0xa [ 1985.530577] ? create_object.isra.0+0x3a/0xa20 [ 1985.531227] should_failslab+0x5/0x20 [ 1985.531764] kmem_cache_alloc+0x5b/0x310 [ 1985.532331] create_object.isra.0+0x3a/0xa20 [ 1985.532955] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1985.533805] __kmalloc_node+0x1ae/0x420 [ 1985.534446] kvmalloc_node+0x119/0x170 [ 1985.535115] seq_read_iter+0x9d6/0x12b0 [ 1985.535718] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1985.536570] proc_reg_read_iter+0x20a/0x2e0 [ 1985.537281] new_sync_read+0x424/0x6f0 [ 1985.537979] ? ksys_lseek+0x1b0/0x1b0 [ 1985.538580] ? fsnotify_perm.part.0+0x22d/0x620 [ 1985.539290] ? security_file_permission+0xb1/0xe0 [ 1985.540104] vfs_read+0x4da/0x620 [ 1985.540689] __x64_sys_pread64+0x201/0x260 [ 1985.541354] ? ksys_pread64+0x1b0/0x1b0 [ 1985.541964] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1985.542697] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1985.543591] do_syscall_64+0x33/0x40 [ 1985.544177] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1985.544967] RIP: 0033:0x7f229c9c2b19 [ 1985.545566] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1985.548526] RSP: 002b:00007f2299f38188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 18:40:27 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1985.549718] RAX: ffffffffffffffda RBX: 00007f229cad5f60 RCX: 00007f229c9c2b19 [ 1985.550985] RDX: 0000000000000053 RSI: 0000000020000240 RDI: 0000000000000004 [ 1985.552153] RBP: 00007f2299f381d0 R08: 0000000000000000 R09: 0000000000000000 [ 1985.553320] R10: 0000000200000048 R11: 0000000000000246 R12: 0000000000000001 [ 1985.554448] R13: 00007fff187a792f R14: 00007f2299f38300 R15: 0000000000022000 18:40:27 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1985.582517] 9pnet: p9_fd_create_tcp (11053): problem connecting socket to 127.0.0.1 18:40:27 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x1800, 0x0, 0x0, 0x2e) [ 1985.653055] 9pnet: p9_fd_create_tcp (11054): problem connecting socket to 127.0.0.1 [ 1985.744836] 9pnet: p9_fd_create_tcp (11067): problem connecting socket to 127.0.0.1 [ 1985.764564] 9pnet: p9_fd_create_tcp (11068): problem connecting socket to 127.0.0.1 18:40:43 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0xb9c7}, 0x400, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000440)={0xa, 0x4e21, 0x3, @mcast1, 0x7fff}, 0x1c) connect$inet6(r0, &(0x7f0000000400)={0xa, 0x4e20, 0x13f2000, @private1, 0x6}, 0x1c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) chdir(&(0x7f0000000180)='./file1\x00') syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 18:40:43 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x1800, 0x0, 0x0, 0x2e) 18:40:43 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x1e00, 0x0, 0x0, 0x2e) 18:40:43 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:40:43 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:40:43 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:40:43 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x0) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:40:43 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) (fail_nth: 3) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2001.020574] FAULT_INJECTION: forcing a failure. [ 2001.020574] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 2001.023964] CPU: 0 PID: 11092 Comm: syz-executor.5 Not tainted 5.10.234 #1 [ 2001.025441] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2001.027275] Call Trace: [ 2001.027835] dump_stack+0x107/0x167 [ 2001.028603] should_fail.cold+0x5/0xa [ 2001.029426] _copy_to_user+0x2e/0x180 [ 2001.030247] simple_read_from_buffer+0xcc/0x160 [ 2001.031240] proc_fail_nth_read+0x198/0x230 [ 2001.032162] ? proc_sessionid_read+0x230/0x230 [ 2001.033119] ? security_file_permission+0xb1/0xe0 [ 2001.034150] ? proc_sessionid_read+0x230/0x230 [ 2001.035111] vfs_read+0x228/0x620 [ 2001.035847] ksys_read+0x12d/0x260 [ 2001.036595] ? vfs_write+0xb10/0xb10 [ 2001.037391] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2001.038499] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2001.039594] do_syscall_64+0x33/0x40 [ 2001.040382] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2001.041488] RIP: 0033:0x7f229c97569c [ 2001.042272] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2001.046158] RSP: 002b:00007f2299f38170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2001.047761] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f229c97569c [ 2001.049258] RDX: 000000000000000f RSI: 00007f2299f381e0 RDI: 0000000000000005 [ 2001.050764] RBP: 00007f2299f381d0 R08: 0000000000000000 R09: 0000000000000000 [ 2001.052264] R10: 0000000200000048 R11: 0000000000000246 R12: 0000000000000001 [ 2001.053771] R13: 00007fff187a792f R14: 00007f2299f38300 R15: 0000000000022000 [ 2001.082627] 9pnet: p9_fd_create_tcp (11093): problem connecting socket to 127.0.0.1 [ 2001.087030] 9pnet: p9_fd_create_tcp (11089): problem connecting socket to 127.0.0.1 [ 2001.089823] 9pnet: p9_fd_create_tcp (11090): problem connecting socket to 127.0.0.1 [ 2001.101130] 9pnet: p9_fd_create_tcp (11097): problem connecting socket to 127.0.0.1 18:40:43 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, 0x0, 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:40:43 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:40:43 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:40:43 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2001.310870] 9pnet: p9_fd_create_tcp (11107): problem connecting socket to 127.0.0.1 18:40:43 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:40:43 executing program 3: sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="74029ce7", @ANYRES16=0x0, @ANYBLOB="010027bd7000fbdbdf250b0000000c00018008000800030000002800028005000d000100000014000100fc02000000000000000000000000000008000800740000002800018008000b00736970000c00070004000000010000000800090050000000060004004e210000"], 0x70}, 0x1, 0x0, 0x0, 0x40040d0}, 0x40) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, 0xfffffffffffffec8) fchmod(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x406e2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000011c0)={0x28, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x10, 0x0, 0x0, @fd=r2}]}]}, 0x28}}, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000140)={'lo\x00'}) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1001, 0x0) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000000180)="a57a65569418c4b169dc2ce2544416015726d1e40b48da4ae6276398a6ec06ddd7c8e0becb7072fc59067e99eec3f4b0fd50ffe9c5674b23532fa7d0d12b0d152267494e19a87f0232a87623e24808b265c489589e7c2be9db983c766b6feda6f58ff5b9ce3cf38f5bcb6f1542f059aace9cea2aaffebb28676f1c69d64d68cc6b0e05e7f8b8b3298b9ede8a893fd8fb46e6", 0x92}, {&(0x7f0000000240)="c98a349acc08306206bf76687a8d1223f6007b1959863c94486456249d31e77d97500ae050097588fc08f00aafffd58bedee4632c5c29f685652d5921781160f910c6c67ae2b28984395f182c3ae7959162dfd562e00f2fdbccf0b9b59b6bcc9ff6d5646dbc64668b96530eb25533524a1fa01a92998d902149f2652dae988be52893dfc9d845f096143301fd233febb1f810154efd749665b8702", 0x9b}, {&(0x7f0000000300)="f754c102d2a01d5b5818de2063894df04ff306f683c072ae5769fb75c1269bc2ebfd54b707f584970d81e95a8afc999f027b2206ecc3eea642274fbb053dd8ed6e8bbe5b6e088f14b7caced5e42284eeac5c231751da4e535b8bae45153235fc23f0875ed8c87af402454c8eae800e194ea23899067c5eb59f2f21f24258dc9d9df1408d2036125fd80b990b16160bd5b855764b722358d53d09331d8b8be54fda2f23684d090f56b1e87f23b0e79b33a4452998966fb3baf1c5ffbb2a51f4a98f221207a772a6bb80e8e4ce6ccd3065a5ba7e2518440acf1e6f0ed8461c6c26da", 0xe1}, {&(0x7f0000000400)="69880fe6a9ec76b06df624f4d5ff0c6e1c2603b3ceeb227cf849daf22163699955dae5035cd212f47d6e4875e76919c2139e2bfad81dbe38fbce62eff2a14e1a57c96e0c5ef8048e1b3b8bf15703c20620e42167eb5198eab1b0cd7eab4a556ced1426874c2e2d2c92ce1d97b8defdbab5748729027bbf7ed334226db413a7476b80821e258798c4677d7b8315cc6f8a90803f9ed64b4efff4720966b8", 0x9d}, {&(0x7f00000004c0)="6544d9b2013684b6119eb2e23fc1ac8a7200889991cd4893e24cf4ebe899dff1c1b8af4b3adfce6ed05e336378e31df8847624a5de07cd85228e2000f8e34fc84d3af209fe18e33d0b8805694d80571b78ffe3f61b41b2c7c990e52e4baf4eff3f4b4285783a03660b78d5cb522c4b128114febbf7534c389166f083dbd80019a11e90d624053ee6d67008ef6572629283ef2420219814939c50c38161470f72972ae0f52413afaa8dff02be6981714c95c80983e4cc39cacb56c1ddec70eda8b630c86db015eb79e1", 0xc9}], 0x5) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x4300, 0x4) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00)=[{{0x0, 0x11, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x3}, 0x200000}], 0x7ffff000, 0x0) ioctl$FITHAW(0xffffffffffffffff, 0xc0045878) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00'}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffb, 0xfffffffffffffffc}, 0x2, 0x0, 0x1004, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 2001.437528] 9pnet: p9_fd_create_tcp (11115): problem connecting socket to 127.0.0.1 [ 2001.447684] 9pnet: p9_fd_create_tcp (11114): problem connecting socket to 127.0.0.1 [ 2001.527943] 9pnet: p9_fd_create_tcp (11118): problem connecting socket to 127.0.0.1 [ 2001.545765] netlink: 'syz-executor.3': attribute type 16 has an invalid length. [ 2001.605656] netlink: 'syz-executor.3': attribute type 16 has an invalid length. 18:40:56 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x2000, 0x0, 0x0, 0x2e) 18:40:56 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, 0x0, 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:40:56 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:40:56 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:40:56 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x20000293, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:40:56 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:40:56 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1613bf23, 0x0, @perf_bp={&(0x7f0000000340)}, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000300)=0x5, 0x4) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x2000000}}}, 0x108) fspick(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x1) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000001c0)=0x2) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), 0xc) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x98, 0x0, 0x4, 0x70bd29, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x4}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7f}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x3f}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_ADDR={0x4}]}, 0x98}, 0x1, 0x0, 0x0, 0x4004000}, 0x80) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) lseek(r2, 0x800, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) bind(r2, &(0x7f0000000280)=@llc={0x1a, 0x30f, 0x8, 0x7f, 0x9, 0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x80) 18:40:56 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) lseek(0xffffffffffffffff, 0xfffffffffffffffa, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000000)={0xac20}, 0x4) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x5, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$int_in(r2, 0x5452, &(0x7f00000000c0)=0x87) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x2, 0x0, 0x0) sendmsg$NL80211_CMD_SET_QOS_MAP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYBLOB="c0f7a900", @ANYRES16=0x0, @ANYBLOB="200028bd7000fddbdf25680000000c00990001000000800000002a00c700ff0407066a03cb037f03000481043f0403070702fb07080704050804db03d628977f06a0fa9000001200c7009d07ff025800ce8ea718c3dee2a700002600c7000907ff000005a180ff01f8070602050507045d0506010804ff079a93156d9b06b2bb00001c00c700050600053f04c90200046a0480000101e58a8185a656fe651a00c7000005010708060802040702068001b32403797fcd4f370000"], 0xc0}, 0x1, 0x0, 0x0, 0x4}, 0x200048d8) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000002c0)=ANY=[]) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='net/icmp\x00') connect$inet6(r3, &(0x7f0000000240)={0xa, 0x4e24, 0x20400000, @private2={0xfc, 0x2, '\x00', 0x1}}, 0x1c) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000100)='netpci0\x00', 0x10) socket$inet6_icmp(0xa, 0x2, 0x3a) lseek(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x1100, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) [ 2014.709026] 9pnet: p9_fd_create_tcp (11144): problem connecting socket to 127.0.0.1 [ 2014.733255] 9pnet: p9_fd_create_tcp (11141): problem connecting socket to 127.0.0.1 [ 2014.734212] 9pnet: p9_fd_create_tcp (11145): problem connecting socket to 127.0.0.1 18:40:57 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x0, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 2014.753829] 9pnet: p9_fd_create_tcp (11146): problem connecting socket to 127.0.0.1 18:40:57 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2014.809914] 9pnet: p9_fd_create_tcp (11145): problem connecting socket to 127.0.0.1 18:40:57 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:40:57 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, 0x0, 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:40:57 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x6) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2015.021608] 9pnet: p9_fd_create_tcp (11162): problem connecting socket to 127.0.0.1 18:40:57 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2015.088560] 9pnet: p9_fd_create_tcp (11166): problem connecting socket to 127.0.0.1 18:40:57 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x0, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:40:57 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x2400, 0x0, 0x0, 0x2e) [ 2015.158036] 9pnet: p9_fd_create_tcp (11171): problem connecting socket to 127.0.0.1 [ 2015.171089] 9pnet: p9_fd_create_tcp (11170): problem connecting socket to 127.0.0.1 [ 2015.241917] 9pnet: p9_fd_create_tcp (11176): problem connecting socket to 127.0.0.1 [ 2015.262226] 9pnet: p9_fd_create_tcp (11175): problem connecting socket to 127.0.0.1 18:41:13 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x10) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:41:13 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000180)) 18:41:13 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x2a00, 0x0, 0x0, 0x2e) 18:41:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000280)={'wlan0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) dup(r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = dup(r4) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x30, r6, 0x325, 0x0, 0x0, {{0x32}, {@val={0x8, 0x67}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) sendmsg$NL80211_CMD_START_AP(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0xfc, r6, 0x100, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x0, 0x78}}}}, [@NL80211_ATTR_INACTIVITY_TIMEOUT={0x6, 0x96, 0xf5}, @acl_policy=[@NL80211_ATTR_ACL_POLICY={0x8}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x80eb6b701c017c23}, @NL80211_ATTR_MAC_ADDRS={0x28, 0xa6, 0x0, 0x1, [{0xa}, {0xa}, {0xa}]}, @NL80211_ATTR_ACL_POLICY={0x8}, @NL80211_ATTR_MAC_ADDRS={0x7c, 0xa6, 0x0, 0x1, [{0xa, 0x6, @broadcast}, {0xa, 0x6, @device_b}, {0xa}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @device_b}, {0xa}, {0xa}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}]}, @NL80211_ATTR_ACL_POLICY={0x8}], @NL80211_ATTR_SMPS_MODE={0x5, 0xd5, 0x88ecbb8bae405a0a}, @NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x3}]}, 0xfc}, 0x1, 0x0, 0x0, 0x20000004}, 0x40) sendmsg$NL80211_CMD_SET_POWER_SAVE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}]}, 0x24}}, 0x0) 18:41:13 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:41:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x0, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:41:13 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:41:13 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2031.099880] 9pnet: p9_fd_create_tcp (11200): problem connecting socket to 127.0.0.1 [ 2031.123929] 9pnet: p9_fd_create_tcp (11199): problem connecting socket to 127.0.0.1 [ 2031.137926] 9pnet: p9_fd_create_tcp (11204): problem connecting socket to 127.0.0.1 18:41:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 2031.166117] 9pnet: p9_fd_create_tcp (11201): problem connecting socket to 127.0.0.1 [ 2031.177625] 9pnet: p9_fd_create_tcp (11200): problem connecting socket to 127.0.0.1 18:41:13 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:41:13 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000280)=ANY=[@ANYBLOB="0500"/12, @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00'/16]) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)={0x10c4, 0x1d, 0x20, 0x70bd2d, 0x25dfdbfe, {0x12}, [@generic="fa9f13d58c3351643caa44725e873b86303ee8a3b887634fa0ea4b1f621c7f792a40af245f9f4e5fa7a9564bc80fffa328a279a200aa5d0d113c5f5126548b21fa501c7042681040433893bd4a", @typed={0xc, 0x84, 0x0, 0x0, @u64=0x2}, @nested={0x1049, 0x82, 0x0, 0x1, [@generic="40dfe66ab6f9c00803a9cef908abf26a73c1b39db2b8a1c014f134af410cde47eee92a5f2a7bc69d548fba8b4d979e3758cab858e2632eaaeddf64d79ec7a84aee2253e7fa", @generic="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"]}, @typed={0x8, 0x69, 0x0, 0x0, @u32=0x180}]}, 0x10c4}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup(r1) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/i2c', 0x8000, 0x42) r3 = syz_open_dev$vcsn(&(0x7f0000000040), 0x6, 0x80100) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r3) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x30, 0x0, 0x8, 0x70bd26, 0x25dfdbfe, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008844) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="250300000000fbdbdf25320000000800670c009900000000000000000000000000006e358069be4bfb95a69f0910d1921fdd5592799596086ffbd88a3bcad2ad6705c4a1a5e0190fc8d68e05fad39e20de4985d424ede70b2ea56247fed27e3a0d7afd1e89b013fe5f12a3e3"], 0x28}}, 0x0) 18:41:13 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:41:13 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:41:13 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x1a) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:41:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETKMSGREDIRECT(r0, 0x541c, &(0x7f0000000000)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup(r1) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="25033063547f68085e56f2f96c81ace61ca9000000000000000032000000080067000000000008000300", @ANYRES32=0x0, @ANYBLOB="0c0099000000000000000000826dfa37e29779d6928350b4567439790be143712bd024afb50860a6c66cccbd"], 0x30}}, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x0) 18:41:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 2031.551053] 9pnet: p9_fd_create_tcp (11224): problem connecting socket to 127.0.0.1 [ 2031.553005] 9pnet: p9_fd_create_tcp (11225): problem connecting socket to 127.0.0.1 [ 2031.580831] 9pnet: p9_fd_create_tcp (11226): problem connecting socket to 127.0.0.1 [ 2031.609889] 9pnet: p9_fd_create_tcp (11227): problem connecting socket to 127.0.0.1 [ 2031.647749] 9pnet: p9_fd_create_tcp (11236): problem connecting socket to 127.0.0.1 18:41:29 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:41:29 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x2e00, 0x0, 0x0, 0x2e) 18:41:29 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:41:29 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:41:29 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:41:29 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x2a00, 0x0, 0x0, 0x2e) 18:41:29 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x24) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:41:29 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:41:29 executing program 3: connect$bt_sco(0xffffffffffffffff, &(0x7f0000000000)={0x1f, @none}, 0x8) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000040)={0x0, 'veth0_to_team\x00', {}, 0x9}) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000080)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x180, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x6, 0x5, 0x1, 'queue0\x00', 0x1}) r1 = accept4$unix(r0, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e, 0x0) shutdown(r1, 0x1) recvmmsg$unix(r0, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000280)=""/163, 0xa3}], 0x1}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/171, 0xab}, {&(0x7f0000000440)=""/179, 0xb3}], 0x2, &(0x7f0000000540)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xe0}}], 0x2, 0x41, &(0x7f00000006c0)={0x77359400}) sendmsg$inet(r4, &(0x7f0000001a80)={&(0x7f0000000700)={0x2, 0x4e24, @remote}, 0x10, &(0x7f0000001a00)=[{&(0x7f0000000740)="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", 0x1000}, {&(0x7f0000001740)="95ff5d5c42d0e6c559fbe42dcf696a1d8a7694776ffb6d1cabedea6379107fd63ed075e032a8490143f082ebdc6e388ea9964927af936ef86746c051f3266d734a0d4507784214edee8e34eda34e4fa5e006fb65865afd71e0dd9d45d05497e40a86b1eab4626458f335fcd9d3d423c1e5d89a63622e566b65f3fd2fff902e0b553c90b24a8e", 0x86}, {&(0x7f0000001800)="7a83c387b8d28547abe4043840945ed3d3a2fc9cc98491b12ca6710a489d647bb43966370938e25820e20627e1b8bfb4f87514c3bad96a6baa693b0ed540d81c6e4bae653a2fa96e68845864242e301a9123e2f409cadb7666eff8ee7953603e561e234b343170fa3fd887c073682461f4d5608dbb325bf13899d801e4b5a0c73552a6b6a86bad61aca8bee1a47ca75f80f10864361ea977a7b8751836ec31afd1bb2225078cadf192b24351a879d78d56ed191307e12b9140b7b06679df241f0a6cd6f2e1", 0xc5}, {&(0x7f0000001900)="f87a4b952c50eb6ac485b91c4520ba9a7753f1f66019096aafcf802da4cf821992ab4fda3863d700844ffd3cf84e3c63992aa39321840dda52e9d676bd5eb3585dd113cda3848267dd2e01db078ba1a1fc59916a0bac803e68d133184f91fd3d86161a430765ce35fa0c4e9ad0a1daf6befb96d1b7f607c89245241ced7be138b60324f0f4f3f929d0c8e8dc8418cfdfc03d4c2ed188a54487a9d6e42fda18ade062ea67c79c", 0xa6}, {&(0x7f00000019c0)}], 0x5}, 0x4000000) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r6, 0x8930, &(0x7f0000001b00)={'veth1_to_batadv\x00', @ifru_data=&(0x7f0000001ac0)="72273f191f9606c3d9a4a24cffb34e7ae9b25c831a393ab09382a9f0e4465ccd"}) r7 = open(&(0x7f0000001b40)='./file0\x00', 0xa8003, 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r5, &(0x7f0000001b80)={0xa, 0x4e21, 0xa30000, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x800}, 0x1c) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r7, 0xd000943e, &(0x7f0000001bc0)={0x0, 0x0, "56e19172109bcbd1502aad6ca79d62e0eb677c8c5edbaea287b0339b84ee71ca7da760590331d4df22bd9286b391215ec527225bfbc5c244b44bf8d01dc9684eb2b922b873ad934fa1ae095f7bc3c5768dc2305b78e68346a068c18b4454526c32042b1833f866d97cb5f4b590ecdcae7a0c70c19c7092e14ebfe4dc35c64da1486717358ee1b42813d44cba6738a6df0de08d9eab5c1ca59d4c85674a3655bc520ad4f8ea0017691c084b2e007dcda80cd7da1e32e9158336a731f3534e71eb6893b485501f1666ce1baac97e63c236619823512ad758568b4130d953e8a407f9da952d96b377384f1e5a6ca005d1c48671fbc7fdb69c82334da118388a5d27", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000002bc0)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000003bc0)={r8, r9, "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", "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"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x40605346, &(0x7f0000004bc0)={0x14f4, 0x2, {0xffffffffffffffff, 0x0, 0x6, 0x3, 0x7b7}, 0xffff}) r10 = openat$cgroup(r5, &(0x7f0000004c40)='syz1\x00', 0x200002, 0x0) pwritev(r10, &(0x7f0000004f00)=[{&(0x7f0000004c80)="5012dce04752e8b83398a56bba17a386a97456894b878609ca1cdfe6050adbacf9b1b7b49d1fcb796f29ea5469d276d44d653366f60416cea3212fa1e0443a283831823e90419ec193375006718f498bb9635b7d1370d70eeaf0881b00eb296fdb34c9ecaf45caaf3cb7b8ff6da80bfd84012cd59998c07e4ca4a6e55cbc489481aa93106c69f07686bbdc22ddfd9e268442709b480681912c49af81b59ae6a6bc800e2a960537eb46b1b1ee5afd98e4b74596b9", 0xb4}, {&(0x7f0000004d40)="bf2a2187ec5c1a0d4212ce2fd8a9c3d8d806c42bd5091fc026c47b204e3a7b03967ad52bb2f3504dfe400b49338cc6d921286b7e32", 0x35}, {&(0x7f0000004d80)="85ce7b28173e39b65f545bf7ceb520b6706844cbbd", 0x15}, {&(0x7f0000004dc0)="e2c8b59beb3abfa1722bc552ce362287cea58767af3ec5715f367e481856ebaed3cfd3261780ab5ea1d936a603fa62cf4675daa009005ee4406cf34ea85445de47c70ce553b344e369bb7d72cbdf501d58a6059ae1cb8fdd60090b5a3428b9a2807980ce89655d2a94fb47b05ddd4d60b18c6f30db39943d295b145f60b094e544bea8ee7cda433b502ca31d80", 0x8d}, {&(0x7f0000004e80)="79f32373668ca27f5a24a88e77b47a23f1ef9a6348690fc2eb02e79e389aab661874f399d7edaf6e880281cf19c4696d01e6d04404ca803107fd7df423bc6b47a9b966d2bf6b531d0f5fcb78483b4cc67b7c2f62a3aa03dca7a215d13a00f4", 0x5f}], 0x5, 0x9, 0x20) [ 2047.366116] 9pnet: p9_fd_create_tcp (11254): problem connecting socket to 127.0.0.1 [ 2047.378015] 9pnet: p9_fd_create_tcp (11260): problem connecting socket to 127.0.0.1 18:41:29 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2047.409781] 9pnet: p9_fd_create_tcp (11261): problem connecting socket to 127.0.0.1 [ 2047.439985] 9pnet: p9_fd_create_tcp (11262): problem connecting socket to 127.0.0.1 18:41:29 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x0) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:41:29 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:41:29 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r4]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:41:29 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x2f) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2047.761885] 9pnet: p9_fd_create_tcp (11280): problem connecting socket to 127.0.0.1 18:41:30 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) io_submit(0x0, 0x1, &(0x7f0000000400)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="4fa961a32c46292c4c203b03c6cfcb7f41a36b2033c451524efa095f3259d324fe60cf5baa606c7c29d5626c6a425a3357a6ef9b122793056fe62dc737af44a1070dcbaede3f1a1a803aeec79b506e019ba9a0faad0ffeddee88e9c7f880a2b88dd7ec8a16c3670691b02178a9efe72a78122fdafe8be129a52b1b4d82cc8adf2f88522df22ee2ca034bd40b6be1e2b77c7b9594a599c877", 0x98, 0x0, 0x0, 0x3}]) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) timer_delete(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_usb_connect$hid(0x4, 0x3f, &(0x7f0000000340)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x8, 0x56e, 0xfc, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x2, 0x40, 0x1, [{{0x9, 0x4, 0x0, 0x6, 0x2, 0x3, 0x1, 0x1, 0xb8, {0x9, 0x21, 0x81, 0x1, 0x1, {0x22, 0x6d4}}, {{{0x9, 0x5, 0x81, 0x3, 0x40, 0x9, 0x5, 0x40}}, [{{0x9, 0x5, 0x2, 0x3, 0x3ff, 0xc4, 0x81, 0x4}}]}}}]}}]}}, &(0x7f00000020c0)={0xa, &(0x7f0000000380)={0xa, 0x6, 0x300, 0x5, 0x2, 0x5, 0x20, 0x7f}, 0xf8, &(0x7f0000001e00)={0x5, 0xf, 0xf8, 0x6, [@generic={0xc5, 0x10, 0x1, "e57f27fd6af394f88f9506edd3b346de576408e66481ad2dbdb41f1a31f47d65f8206ee04da0f98e121f1530ee8a50092409f4b9e8bb511f06c7defe45ed8d3cb9f5d4131ef4650d93ee01f043242815f8b77e35933f8abccf7b874f94e4691e7cf6c19937c378f9eba5ed3221eb3a2930d48b7c4f9dae5129d5e6ec871198d90985b7e2cbae44705c89f174ae65ab1fa1b312a4e8fd22c5a5ae1812c1bf50a6be2a3348415ae274368075fb41e3eafb552e376ee4ee661ababdccb03c4d7347fa01"}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x8, 0x8, 0x875}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0x81, 0x40, 0x81}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1}, @ssp_cap={0x10, 0x10, 0xa, 0x3f, 0x1, 0xe3b2, 0xf00f, 0x8, [0x3fc0]}, @ptm_cap={0x3}]}, 0x9, [{0x4, &(0x7f00000003c0)=@lang_id={0x4, 0x3, 0x457}}, {0x15, &(0x7f0000000440)=@string={0x15, 0x3, "bacd2fed0016704b17b9dd464e241948c1c073"}}, {0xc, &(0x7f0000000500)=@string={0xc, 0x3, "d2d3c0153313498c3a95"}}, {0x4, &(0x7f0000001c80)=@lang_id={0x4, 0x3, 0x809}}, {0x1a, &(0x7f0000001d00)=@string={0x1a, 0x3, "3212018e32506d94389aacaf13930a4c3f3348a092f9509e"}}, {0x34, &(0x7f0000001d40)=@string={0x34, 0x3, "7233fdb0232db04814489b972e848874481b57e0159772d4dce66a6c2deb06cdd39ffe32d796f0fedf36f62eac7cd333fecd"}}, {0x8a, &(0x7f0000001f00)=@string={0x8a, 0x3, "754fc28bc86fef5e469dd7546c7fd5f35c12e95291d64008bf09bf994c02591549c116e282ff2097c8341830b35705a08f44811737f6d512b61a1ffb3bbe6115d11ce52ba51019788bad642bb92d41ec9f3464be7fb811a8bce98287749efd3e2dfb242ddd809603f304aedb615fc17e0db59155e7d1af874f3ecdea2bbb5d63c788ae771fac3b70"}}, {0x4, &(0x7f0000001fc0)=@lang_id={0x4, 0x3, 0x455}}, {0xa8, &(0x7f0000002000)=@string={0xa8, 0x3, "5108fcd4cdc5e69afb6e3f4a3d3f266c72b749b53ccc62d235494438178b9eb14ddfa458014a6af8d6cb3157ee1c6e0a63684cb8a1152027f94d30776dc9a8f2081caafd3ad6dd41af85ffb7121a66913f5c306548016e33c144133782acfe0dbaf6e87d88b51ffc74e41e5ea789d7e8bbad10782a17a45b5790a77efdb295f1759d6c57ed800c42866d7f40954402d01486da179beb333f3f0f47443c0044174519f0e40efd"}}]}) timer_create(0x3, &(0x7f0000000000)={0x0, 0x1c, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) timer_gettime(r0, &(0x7f0000000080)) timer_settime(r0, 0x0, &(0x7f00000004c0)={{}, {0x0, 0x3938700}}, &(0x7f00000000c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000600)={0x1678, 0x19, 0x800, 0x70bd28, 0x25dfdbfb, {0x7}, [@generic="df78d2c9ca55d545c28fdcd6f1fd211c67f8337c975eb91ec70950f14b7155f86f1586d46095a6bcafc36c9c5866d394400a2345b3fc4e7ca8c7d0da76c39aaeaf688b8f8e7a5665c7638965ed4acfc0156c7482afe2aec10019f2b14329e4f5d52e39bd7f26a2e88c880ee278b66333927e9e1fcbd34d7d655aa3cf2df20680f8adf28a2f5769b284e8b9a58cb5a0c01214b3b1908e618cace2ce659588b0bd097aa252cf66c04ebcdef2c42cb1173e90a99928b13f684038dfdd476606c0ea1c0910102c398c4f48ad7f567974a534ce149eb9120ffca8f8757d409505533b67797c17fdb54d62c3d91b34c7ce6af3bdeb9db7ed2aa44a", @nested={0x10db, 0xe, 0x0, 0x1, [@generic="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", @typed={0xc, 0x21, 0x0, 0x0, @u64=0x4}, @generic="939b18429fa2b012588bbdcf4c3ba86c968fa2edfebdf1003dda6e9f4f3f747a20e54c170e60bf7a96ad0a35d43309df132c28e80d3b59e09f05fed5a0239b0cc02a2af16fe11764cdc06763119d3d30b9b10bbf910de0d895c925f1351ececcfb26f402e675cf3689fcdca12d00311ae1e6f366eddb352282bd0faff4abd4c26a012ea9a061584adfb28e3eda071e9aa4e6b575d008ade1662e1a1ee59d9b4cce53602825edb4c45a967f68f1d6fc162451d699757ceb98fa6f9006e9e9d9d9edc799857c3179e3139111"]}, @generic="c7b8fa6fe91b7745fccce16194819d10d7062effbbf9d2cfbfec393a857119e138cb623582f7d0ee3e5e6a464bdd5610b8f01cb3852e92366528ea7f94d38c07cfa5fec87c7b5cdd222563dbb424630b1109c9566ab83ecc6fbc44c60db363ccad283b2590a6c4429ab8c6a4a2f91309979d7c5b2a1f26ae7d87261274c895a1633435c40cba1c2feb8b059eb3045e2c89", @generic="9c4edf3acc828d24bb41bca0f8", @nested={0x3e9, 0x85, 0x0, 0x1, [@generic="87ae3c8ee29b2807f034b227f2444915d7561044c6b9ee3b86b804720bafb0baaa771b3d44cfd0aac9cfd15d82e7360a813a7bb5ce46b2f1157df9a947ff0a0b0b4017b63a9454b6eb19bcfb9ef591816df6bd7bb91a0880a6b90da7dea0c0cebe32ca4b871232ec814f019e2be1034579b9a7fdf0c3cbcb8d138e17c9706967a3f72edcd0e56193fd4b0ee9883f07aa9bfb90ee0ac89394805a4001", @generic="7fb99de0d31c03c01eeeb7f44b97de411eb3167bbbae502044e22a954b525838cc40d83ba820bf881eea15be1ca6387cc14e400c2969de32b92bf5a17595405b31baa6d3d8741e12a7edbad84147209aeecf77373dfe9c8cbaa96bd1cd983562a2ed10974ba6999166a9605329135cdfd3c46fbc77e7c23b2d05c5d5d6c3fe05743fc9c6f25b2a87afa3e9c9a2b03b6962c56a09281d1c6599d0ba05ef2b4ee35cfe8321f18404cfafceb6aafadb61e0f0fe722df2eb5c1611c59b0e68cf605f92af", @typed={0x8, 0x39, 0x0, 0x0, @uid=r2}, @typed={0x8, 0x77, 0x0, 0x0, @ipv4=@broadcast}, @generic="da3101f922f88d4fa141d8772e087e2a7bba8e7331cef1cdb97822bdf03dc8b9b8a5cd804746da0ff932712d0dbe1b93c4720c78698a64732c38957ee6d7462b83c29c16aa6c4931c4a1182d3df87ca4b753ec1f270309f522a8e95d9c7cd63005fe6e9efff85eb1c94c6c02d11ffe8719d1f33e5dc785da8de3aaefa70d872a07ce173237fa96c09f4ad16d74478dad", @generic="843aac4ab17a28e5504d6b36ab0716592b6e80cec61e3d088950c34a3f93c4a95ad705c1e76f298a60dd3a5f138dd3e32ea429837cf092ef07846ca0f3dae1dab62b239b60e09af9869a03d2bcbc4311e0e7f3d6fedfd4fe9f1ad1d78d6c1f072a2e22fb13c98e95ce6d33a9480971beeaf51b0afc89c446430141409191f1432da2761bd22510434aefd509156b078f4b3cbdc10c7485326b7c544c9f1dc8acb3ca0820f78dc593330b39693842f4dcc7c0f11582dc074aeb499583ff32ff4d02d523b16744f508d2eb917a2019e409ff97c5ae28250d99cdfb316512ff61dd57e2835b6a4f441fd0cc97", @typed={0x7, 0x52, 0x0, 0x0, @str='++\x00'}, @generic="1668449b02746d47581777c108ad20e1bce6c0016dcf4717ce4ecdb77909397cb3874028a89ab435f96cbe315d01d526b4081cb27687ebec74440f2f9c65b1eaa223d8cff8d24d4a36019b5be1044ff03dd12a3d688d8368c5ed93982844d0e3b7a959cf81cce83cae96b2a68ad393140c17042d6c16da0ca0877b5f209453b86a57ed5c1335c1f205da6c7898521d40917fba86197b6a965589eef444b853a7cdccf064d6a3cbc7ecf59aa1d2ba53b182e2bf28daa752cbc3b3370adbd50fcd01f2a5c4ad926d42e339265d3133f96ffb627352a91d6c37db6abcf5dba8573bcd889268a148ca8a", @typed={0x8, 0x1a, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x4, 0x6b}]}, @typed={0x4, 0x62}]}, 0x1678}, 0x1, 0x0, 0x0, 0x50}, 0x40010) timer_create(0x6, &(0x7f0000000240)={0x0, 0x4, 0x4}, &(0x7f00000002c0)) clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2047.796739] 9pnet: p9_fd_create_tcp (11281): problem connecting socket to 127.0.0.1 [ 2047.827257] 9pnet: p9_fd_create_tcp (11283): problem connecting socket to 127.0.0.1 18:41:30 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2047.938092] 9pnet: p9_fd_create_tcp (11293): problem connecting socket to 127.0.0.1 [ 2048.021496] 9pnet: p9_fd_create_tcp (11293): problem connecting socket to 127.0.0.1 [ 2048.088510] 9pnet: p9_fd_create_tcp (11303): problem connecting socket to 127.0.0.1 18:41:44 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x3000, 0x0, 0x0, 0x2e) 18:41:44 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r4]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:41:44 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x35) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:41:44 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:41:44 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:41:44 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) r2 = perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x28000, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r3, 0x0, 0x0) r4 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r4, &(0x7f0000000340)=""/34, 0x22) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0100000001000000180000", @ANYRES32=r2, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='\r\x00\x00\x00\x00']) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000280)=@chain) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x4300, 0x4) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00)=[{{0x0, 0x11, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x3}, 0x200000}], 0x7ffff000, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000380)=0x101) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', r5, r6, 0x1000) keyctl$chown(0x4, 0x0, r5, 0xffffffffffffffff) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) dup2(r0, 0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d020000000000000200000000", 0xc7, 0xb800}], 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"]) 18:41:44 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x8, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') syz_open_dev$vcsn(0x0, 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x46000) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x127c, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @any, 0xfffb}, 0xe) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) sendmmsg(r0, &(0x7f0000001040), 0x3fffffffffffdca, 0x40) creat(0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {r3}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x7, [{}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {0x0, r10}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {r8}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050600)={0x7f, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {0x0, r9}], 0x9, "dbd4ab53cd05c3"}) 18:41:44 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x0) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2062.522762] 9pnet: p9_fd_create_tcp (11322): problem connecting socket to 127.0.0.1 [ 2062.544535] 9pnet: p9_fd_create_tcp (11324): problem connecting socket to 127.0.0.1 [ 2062.563987] 9pnet: p9_fd_create_tcp (11327): problem connecting socket to 127.0.0.1 18:41:44 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x3c) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2062.576983] 9pnet: p9_fd_create_tcp (11328): problem connecting socket to 127.0.0.1 18:41:44 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:41:44 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT=r4]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:41:44 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:41:45 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/cgroup.procs\x00', 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = dup(r4) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x30, r6, 0x325, 0x0, 0x0, {{0x32}, {@val={0x8, 0x67}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r2) fork() read(r3, &(0x7f00000001c0)=""/175, 0xaf) 18:41:45 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x0) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2062.836783] 9pnet: p9_fd_create_tcp (11342): problem connecting socket to 127.0.0.1 [ 2062.891811] 9pnet: p9_fd_create_tcp (11344): problem connecting socket to 127.0.0.1 [ 2062.900960] 9pnet: p9_fd_create_tcp (11351): problem connecting socket to 127.0.0.1 18:41:45 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:41:45 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2063.049068] 9pnet: p9_fd_create_tcp (11356): problem connecting socket to 127.0.0.1 [ 2063.112063] 9pnet: p9_fd_create_tcp (11366): problem connecting socket to 127.0.0.1 [ 2063.138936] 9pnet: p9_fd_create_tcp (11365): problem connecting socket to 127.0.0.1 18:41:59 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x3600, 0x0, 0x0, 0x2e) 18:41:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x9) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000015c0)=ANY=[@ANYBLOB="0100002f01000000ee314b08", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00', @ANYBLOB="f8095e9ad8919f4874b3e01dabca73e2f6bf6d5c5bc2820a01088ce774ed593771d4b9fca06a1fa04da8631e6a774e35ab3a7e6f82c814444c962f9ef22540d825da8a09ec2b78a48f9700f9b560cf44767728551fa4b1eff0b7581903a90454041b119549c68d07c40070d9f239e51522fc7e7912ea7e3dd3749f65604e83dd0bc0769d674e373f1c146b23c495a905c57ea288550b7ec539944a5583257388c7dbc582284e915cd1c8a8da392b269e07b9f2bd830b2f6fa8a6b5c38dd6495085339f27e3ee23ee54018f8bbcf72cf123b95ece83735b8600315fb0a79f"]) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000100)=[r0, 0xffffffffffffffff], 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) openat$hpet(0xffffffffffffff9c, 0x0, 0x98100, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000180)=""/45, 0x2d}, {&(0x7f0000000340)=""/1, 0x1}, {&(0x7f0000000400)=""/34, 0x22}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/10, 0xa}, {&(0x7f0000001480)=""/177, 0xb1}], 0x6, 0x5559, 0xff) fcntl$setown(r2, 0x8, 0xffffffffffffffff) close(r2) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="df25020000000000000000000000000000000000ff07000000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x50880}, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f00000000c0)={0x6200, 0x1f, 0x1}) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100400018000700", @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00./file0\x00']) lseek(r1, 0x0, 0x2) ftruncate(0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x4000, 0x128) copy_file_range(r3, 0x0, r1, 0x0, 0x200f5ef, 0x0) 18:41:59 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:41:59 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0xfffffffe, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000001780)=""/251, 0xfb}, {&(0x7f0000001880)=""/102, 0x66}, {&(0x7f0000001900)=""/130, 0x82}, {&(0x7f00000019c0)=""/95, 0x5f}], 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10181, 0x0) ftruncate(r1, 0x1000003) openat$cgroup_procs(r1, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002180)={0x0, 0xfffffffffffffffd, 0xde, 0xba, @scatter={0x5, 0x0, &(0x7f0000001f00)=[{&(0x7f0000000080)=""/51, 0x33}, {&(0x7f0000001640)=""/194, 0xc2}, {&(0x7f0000001500)=""/105, 0x69}, {&(0x7f0000001e00)=""/195, 0xc3}, {&(0x7f0000001cc0)=""/158, 0x9e}]}, &(0x7f0000001f80)="46a0868e9d671237b654c84cf5c6b7016bbdf6160b45af7a8389ca80295c5362a656bb77851fabe90db58a92cf04e8c5f9d74af0d42bdcd654d7ddcd61ab5f4adf8f9ba4055f922a7efaa0cb074ff7ec6b657a762f7348236a1c3dfd5c03db3aa2f479b79aee6715e49baa2de07242563dcb7d27cef1602a6f46902e4819da3bd3f8c26b1d00de693cad5a3633786fe7c7c27e7529e561cc96f0450cadef4ac925ef3b3bbb3c34238b80c47b97cde453f77bc85be32f51590d2c234538f7458d7c4a61ffc34d773a2aba5bbd95502107a4c3f9dc8fc6d9801d06e6aa94c9", &(0x7f0000002080)=""/219, 0x4, 0x10034, 0x1, &(0x7f00000000c0)}) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="82d7c17975457a078fad03269d879ed4692cba12"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000014c0), 0x103, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) unshare(0x48020200) 18:41:59 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:41:59 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:41:59 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x44) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:41:59 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2077.321103] 9pnet: p9_fd_create_tcp (11389): problem connecting socket to 127.0.0.1 18:41:59 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2077.341799] 9pnet: p9_fd_create_tcp (11390): problem connecting socket to 127.0.0.1 18:41:59 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x3a1) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) lseek(r1, 0x3, 0xb5e46223464a3991) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000600)={0xa, 0x0, 0xffffffff, @loopback, 0x3}, 0x1c) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x200}}, './file0\x00'}) sendmsg$inet6(r4, &(0x7f0000000480)={&(0x7f0000000380)={0xa, 0x4e24, 0x2213, @private2, 0x3}, 0x1c, &(0x7f0000000440)=[{&(0x7f00000003c0)="cae9fea6b77d6d12674eea019c7d5a22bfe5764ab9c4e9a40c080df691fff86592845d7a25f59d10a2e4919b3e3b9f08ca06c621453f3ca32880608441848839ea28e6257b6de95334a9c29e1f9a4693edb875003a69a4c54c45218285f1d6f3ee9e89db97e1e8ceedfdfa54212c7ac6764b89df1a03b1f34288dc22", 0x7c}], 0x1, &(0x7f0000000500)=[@rthdr_2292={{0x38, 0x29, 0x39, {0x32, 0x4, 0x1, 0xa9, 0x0, [@loopback, @rand_addr=' \x01\x00']}}}, @flowinfo={{0x14, 0x29, 0xb, 0x93}}, @tclass={{0x14, 0x29, 0x43, 0x4}}], 0x68}, 0x20000874) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x29, 0x1, &(0x7f0000000040), 0x4) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) statx(r0, &(0x7f0000000200)='./file0\x00', 0x6000, 0x1, &(0x7f0000000240)) shutdown(r5, 0x1) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f0000000000)=0x8, 0x4) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xf, 0xffffffffffffffff, 0x3) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23, 0x10001, @private0={0xfc, 0x0, '\x00', 0x1}, 0x6}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$inet6(0xa, 0x4, 0x9) [ 2077.360754] 9pnet: p9_fd_create_tcp (11388): problem connecting socket to 127.0.0.1 [ 2077.361887] 9pnet: p9_fd_create_tcp (11391): problem connecting socket to 127.0.0.1 18:41:59 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:41:59 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 2077.402980] 9pnet: p9_fd_create_tcp (11399): problem connecting socket to 127.0.0.1 [ 2077.527811] 9pnet: p9_fd_create_tcp (11404): problem connecting socket to 127.0.0.1 18:41:59 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:41:59 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x48) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2077.626564] 9pnet: p9_fd_create_tcp (11411): problem connecting socket to 127.0.0.1 18:41:59 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2077.788747] 9pnet: p9_fd_create_tcp (11419): problem connecting socket to 127.0.0.1 [ 2077.792851] 9pnet: p9_fd_create_tcp (11420): problem connecting socket to 127.0.0.1 [ 2077.875162] 9pnet: p9_fd_create_tcp (11427): problem connecting socket to 127.0.0.1 [ 2077.896026] 9pnet: p9_fd_create_tcp (11424): problem connecting socket to 127.0.0.1 18:42:13 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:42:13 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:13 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x3a98, 0x0, 0x0, 0x2e) 18:42:13 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5f4b4131132df60, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x2, 0x2, &(0x7f0000001380)=[{&(0x7f0000000340)="34092445fc374d399fac25b7c951d742d7a96786b4fceb658c3d5df79510a3e5c4", 0x21, 0x5}, {&(0x7f0000000380)="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", 0x1000, 0x144}], 0x19062, &(0x7f00000013c0)={[{@shortname_winnt}], [{@dont_appraise}, {@obj_role={'obj_role', 0x3d, '\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'trusted.overlay.origin\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}) mount(0x0, &(0x7f0000001440)='./file0\x00', &(0x7f0000000040)='vfat\x00', 0x20041, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f00000002c0)={'syztnl2\x00', 0x0, 0x4, 0x1a, 0xff, 0x3a21, 0x52, @mcast1, @private1, 0x1, 0x1, 0x6, 0x38}}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x4400, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000001, 0x30, r0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f0000000080)='./file0\x00') lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x2) 18:42:13 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:13 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x4c) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:13 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) r1 = syz_io_uring_setup(0x3872, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f0000000100)) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r1, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0xf, 0x13, r1, 0x8000000) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x42000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) kcmp(r0, 0x0, 0x1, r1, r2) r4 = memfd_create(&(0x7f0000000340)='\x00', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0xb, 0x1d012, r4, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f00005e1000/0x1000)=nil, 0x1000, 0x2000001, 0x100010, r3, 0x8000000) syz_io_uring_setup(0xa61, &(0x7f00000006c0)={0x0, 0x400, 0x0, 0x2, 0x216}, &(0x7f00000a0000)=nil, &(0x7f0000699000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) dup(r4) syz_io_uring_submit(r6, r7, &(0x7f0000000340)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r8, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0, 0xc6da2cc48daca113}, 0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x5, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x1, r9}}, 0x10001) syz_io_uring_submit(r5, r7, &(0x7f0000000040)=@IORING_OP_WRITE_FIXED={0x5, 0x5, 0x2000, @fd_index=0x9, 0x100000001, 0x3ff, 0x4, 0x7, 0x0, {0x0, r9}}, 0x101) finit_module(r4, 0x0, 0x0) [ 2091.496710] 9pnet: p9_fd_create_tcp (11449): problem connecting socket to 127.0.0.1 18:42:13 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2091.515841] loop3: detected capacity change from 0 to 4096 [ 2091.560935] 9pnet: p9_fd_create_tcp (11447): problem connecting socket to 127.0.0.1 18:42:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 2091.583684] loop3: detected capacity change from 0 to 4096 [ 2091.586400] 9pnet: p9_fd_create_tcp (11452): problem connecting socket to 127.0.0.1 18:42:13 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2091.612942] kauditd_printk_skb: 33 callbacks suppressed [ 2091.612952] audit: type=1400 audit(1739299333.922:215): avc: denied { module_load } for pid=11445 comm="syz-executor.1" path=2F6D656D66643A202864656C6574656429 dev="hugetlbfs" ino=42511 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:hugetlbfs_t:s0 tclass=system permissive=1 [ 2091.617982] 9pnet: p9_fd_create_tcp (11450): problem connecting socket to 127.0.0.1 18:42:13 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) dup(r0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x50, r1, 0x0, 0x70bd29, 0x25dfdbff, {}, [@ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8, 0x13, 0xc4}, @ETHTOOL_A_COALESCE_USE_ADAPTIVE_RX={0x5}, @ETHTOOL_A_COALESCE_RX_USECS_LOW={0x8, 0xe, 0x9}, @ETHTOOL_A_COALESCE_RX_USECS_IRQ={0x8, 0x4, 0x6}, @ETHTOOL_A_COALESCE_RX_MAX_FRAMES_HIGH={0x8, 0x14, 0x9}, @ETHTOOL_A_COALESCE_PKT_RATE_HIGH={0x8, 0x12, 0x6}, @ETHTOOL_A_COALESCE_HEADER={0x4}, @ETHTOOL_A_COALESCE_TX_USECS={0x8, 0x6, 0x400}]}, 0x50}, 0x1, 0x0, 0x0, 0x4008000}, 0x8eb65ff7296f4d2b) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000280)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f00000000000004", 0x1b, 0x2100}], 0x0, &(0x7f0000000140)) openat(r2, &(0x7f0000000240)='./file0\x00', 0x202000, 0x14) [ 2091.661641] Module has invalid ELF structures [ 2091.668454] 9pnet: p9_fd_create_tcp (11464): problem connecting socket to 127.0.0.1 18:42:14 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r2 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000340)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r2, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0, 0xc6da2cc48daca113}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = dup(r3) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x30, 0x0, 0x325, 0x0, 0x0, {{0x32}, {@val={0x8, 0x67}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_STATX={0x15, 0x3, 0x0, r4, &(0x7f0000000440), &(0x7f0000000000)='./file1\x00', 0x7ff, 0x1000, 0xbb9049a96dcd9e2a}, 0x7) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r5) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:14 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:14 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) r1 = syz_io_uring_setup(0x3872, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f0000000100)) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r1, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0xf, 0x13, r1, 0x8000000) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x42000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) kcmp(r0, 0x0, 0x1, r1, r2) r4 = memfd_create(&(0x7f0000000340)='\x00', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0xb, 0x1d012, r4, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f00005e1000/0x1000)=nil, 0x1000, 0x2000001, 0x100010, r3, 0x8000000) syz_io_uring_setup(0xa61, &(0x7f00000006c0)={0x0, 0x400, 0x0, 0x2, 0x216}, &(0x7f00000a0000)=nil, &(0x7f0000699000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) dup(r4) syz_io_uring_submit(r6, r7, &(0x7f0000000340)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r8, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0, 0xc6da2cc48daca113}, 0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x5, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x1, r9}}, 0x10001) syz_io_uring_submit(r5, r7, &(0x7f0000000040)=@IORING_OP_WRITE_FIXED={0x5, 0x5, 0x2000, @fd_index=0x9, 0x100000001, 0x3ff, 0x4, 0x7, 0x0, {0x0, r9}}, 0x101) finit_module(r4, 0x0, 0x0) [ 2091.802094] 9pnet: p9_fd_create_tcp (11473): problem connecting socket to 127.0.0.1 18:42:14 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x3c00, 0x0, 0x0, 0x2e) [ 2091.839480] loop3: detected capacity change from 0 to 16776704 18:42:14 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:14 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2091.924227] 9pnet: p9_fd_create_tcp (11479): problem connecting socket to 127.0.0.1 [ 2091.943079] 9pnet: p9_fd_create_tcp (11486): problem connecting socket to 127.0.0.1 18:42:14 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 2091.958969] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 2091.960470] EXT4-fs (loop3): mount failed [ 2091.983868] 9pnet: p9_fd_create_tcp (11496): problem connecting socket to 127.0.0.1 [ 2091.993082] Module has invalid ELF structures [ 2092.052207] 9pnet: p9_fd_create_tcp (11497): problem connecting socket to 127.0.0.1 18:42:29 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x9, 0x6, 0x4, 0x3, 0x0, 0x0, 0x210, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2923, 0x4, @perf_bp={&(0x7f0000000000), 0x6}, 0x12182, 0x80, 0xff, 0x2, 0x3288, 0x0, 0x7f, 0x0, 0x9, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0xb) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:29 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x4800, 0x0, 0x0, 0x2e) 18:42:29 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), 0x0, &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:29 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:29 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005640)=[{{&(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{0x0, 0x0, &(0x7f0000002400)=[{0x0}, {0x0, 0x39}, {&(0x7f0000002080)="bc", 0x1}], 0x3}}], 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 18:42:29 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:42:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x50839, 0x9}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup(r1) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="24a01df98893e228260000", @ANYRES16=r3, @ANYBLOB="2503000000000000000032000000080067000000000008000300", @ANYRES32=0x0, @ANYBLOB="0c0099000000000000000000"], 0x30}}, 0x0) syz_io_uring_setup(0xdcc, &(0x7f0000000080)={0x0, 0x64e, 0x8, 0x1, 0x24, 0x0, r2}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000140), &(0x7f0000000180)) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="479a"], 0x1020) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r0, 0x0) 18:42:29 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:29 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), 0x0, &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2107.264968] 9pnet: p9_fd_create_tcp (11521): problem connecting socket to 127.0.0.1 [ 2107.278165] 9pnet: p9_fd_create_tcp (11522): problem connecting socket to 127.0.0.1 [ 2107.285130] 9pnet: p9_fd_create_tcp (11526): problem connecting socket to 127.0.0.1 18:42:29 executing program 1: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2107.334080] 9pnet: p9_fd_create_tcp (11535): problem connecting socket to 127.0.0.1 18:42:29 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:29 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 2107.560076] 9pnet: p9_fd_create_tcp (11542): problem connecting socket to 127.0.0.1 18:42:42 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x4c00, 0x0, 0x0, 0x2e) 18:42:42 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:42:42 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), 0x0, &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:42 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:42 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x0, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x400d0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x6, 0x6, 0x566c4482, 0x4, 0x0, 0x5, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) r3 = creat(&(0x7f0000000400)='./file1\x00', 0x21) r4 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) stat(&(0x7f0000000000)='./file1\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) close(r1) ioctl$PIO_FONT(r4, 0x4b61, &(0x7f0000000440)="4f283d5723d7a17903b8d601e242d9c8e0289c0464ff2d039741515e5b6ffb82b4eabdb1038fe47a9695c723a9a6bfcb5a4b0e91b060450847b5e4502d48368357778aa352d5d3b5a481a7928c3ddbe0b05662243901d66145a36fe276ffa6675dd2dfadcf63ba49f8a310e16db465b6") mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$NS_GET_OWNER_UID(r3, 0xb704, &(0x7f0000000700)=0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000880)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x2, 0x0, 0x9, 0x1, &(0x7f00000007c0)="db83fac7aa921b139373fdff4de687cc86a66a4d7aa7ddda8063dcde87a4e2e0691114cd2b5e7e49fdf67bc2f18a190501f197568fed14db42ee9831d5e52aa21f4bff9ed0db86e103dbc75ebb3286da7d97afaa2e629a5c4e6d373e37ab600b6295eb8030495a98fd74a75a6f4ac2450f5827bbf6f9d3127771b2bc064ddf5cef9444e7bcac14a5a7c4ee693489c429b56937792fa6", 0x401, 0x0, 0x0, {0x3}}, 0x8) setresuid(0xffffffffffffffff, r7, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000200)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000540)="ac4de35f335b1e14ed8a46c8070496950bca54b1769337af3aa1a2d48757e3848ad6c634daa7696c0f96db", 0x2b, 0x4}, {&(0x7f0000000580)="cf186c1b60188e28e54e9841c59ee4a6629443b4fbb26e8c31f262f02e9546011e4b26625c268bf20e0ed06030b028400e266e852d753aa82223fd6fbaa5e3f8e5a766d995ec721c2efb4094903c347bde03b5cde94b512d9c60074fcfb0beb04f0984285d0e7f5fb52e1d19aea742a5ac8542370a7562dfe01fc0c869f1486a9adca9e78148151bc5f2256d9e44275acdd91100", 0x94, 0x6}, {&(0x7f0000000640)="975c9b", 0x3, 0x6}], 0x100800, &(0x7f0000000740)={[{@fat=@uid={'uid', 0x3d, r5}}, {@dots}], [{@uid_eq={'uid', 0x3d, r6}}, {@euid_gt={'euid>', r7}}]}) 18:42:42 executing program 1: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:42 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:42 executing program 3: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2120.748896] 9pnet: p9_fd_create_tcp (11565): problem connecting socket to 127.0.0.1 [ 2120.763134] 9pnet: p9_fd_create_tcp (11566): problem connecting socket to 127.0.0.1 [ 2120.766953] 9pnet: p9_fd_create_tcp (11564): problem connecting socket to 127.0.0.1 18:42:43 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:42:43 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:43 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2120.822998] 9pnet: p9_fd_create_tcp (11568): problem connecting socket to 127.0.0.1 [ 2120.847737] 9pnet: p9_fd_create_tcp (11574): problem connecting socket to 127.0.0.1 18:42:43 executing program 1: r0 = perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)=0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x4300, 0x4) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x11, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x3}, 0x200000}], 0x7ffff000, 0x0) ioctl$BTRFS_IOC_ADD_DEV(r1, 0x5000940a, &(0x7f00000004c0)={{r0}, "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"}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffc0003}]}) futex(0x0, 0x86, 0x0, 0x0, 0x0, 0x0) 18:42:43 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', 0x0, 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:43 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) syz_io_uring_setup(0x498e, &(0x7f00000006c0), &(0x7f00000a0000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f00000003c0)=0x0, &(0x7f0000000000)=0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000340)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r5, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0, 0xc6da2cc48daca113}, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000000)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2121.021727] 9pnet: p9_fd_create_tcp (11583): problem connecting socket to 127.0.0.1 [ 2121.121529] 9pnet: p9_fd_create_tcp (11588): problem connecting socket to 127.0.0.1 18:42:43 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:42:43 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:43 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x6800, 0x0, 0x0, 0x2e) 18:42:43 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:43 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', 0x0, 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2121.367177] 9pnet: p9_fd_create_tcp (11595): problem connecting socket to 127.0.0.1 [ 2121.443503] 9pnet: p9_fd_create_tcp (11602): problem connecting socket to 127.0.0.1 [ 2121.457677] 9pnet: p9_fd_create_tcp (11606): problem connecting socket to 127.0.0.1 [ 2121.496873] audit: type=1326 audit(1739299363.806:216): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11584 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f076ec1ab19 code=0x7ffc0000 [ 2121.503556] 9pnet: p9_fd_create_tcp (11604): problem connecting socket to 127.0.0.1 18:42:43 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) open(&(0x7f0000000000)='./file0\x00', 0x440, 0x1f4) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2121.507749] audit: type=1326 audit(1739299363.806:217): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11584 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f076ec1ab19 code=0x7ffc0000 18:42:43 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', 0x0, 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:43 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2121.563614] 9pnet: p9_fd_create_tcp (11569): problem connecting socket to 127.0.0.1 18:42:43 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:42:43 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) io_submit(0x0, 0x1, &(0x7f0000000400)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="4fa961a32c46292c4c203b03c6cfcb7f41a36b2033c451524efa095f3259d324fe60cf5baa606c7c29d5626c6a425a3357a6ef9b122793056fe62dc737af44a1070dcbaede3f1a1a803aeec79b506e019ba9a0faad0ffeddee88e9c7f880a2b88dd7ec8a16c3670691b02178a9efe72a78122fdafe8be129a52b1b4d82cc8adf2f88522df22ee2ca034bd40b6be1e2b77c7b9594a599c877", 0x98, 0x0, 0x0, 0x3}]) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) timer_delete(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x1c, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) timer_gettime(r0, &(0x7f0000000080)) timer_settime(r0, 0x0, &(0x7f00000004c0)={{}, {0x0, 0x3938700}}, &(0x7f0000000500)) r1 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0xcc1e414ed0d4beda, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r1, &(0x7f00000000c0)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, {0x20}}, 0x5) timer_create(0x6, &(0x7f0000000240)={0x0, 0x4, 0x4}, &(0x7f00000002c0)=0x0) ftruncate(0xffffffffffffffff, 0xfd75) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) timer_settime(r2, 0x0, &(0x7f0000000140)={{r3, r4+10000000}, {0x0, 0x3938700}}, &(0x7f0000000180)) clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:43 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2121.715647] audit: type=1326 audit(1739299364.022:218): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11584 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=42 compat=0 ip=0x7f076ec1ab19 code=0x7ffc0000 [ 2121.725643] audit: type=1326 audit(1739299364.025:219): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11584 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f076ec1ab19 code=0x7ffc0000 [ 2121.780447] audit: type=1326 audit(1739299364.025:220): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11584 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f076ec1ab19 code=0x7ffc0000 [ 2121.785435] audit: type=1326 audit(1739299364.035:221): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11584 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f076ec1ab19 code=0x7ffc0000 [ 2121.792044] audit: type=1326 audit(1739299364.035:222): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11584 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f076ec1ab19 code=0x7ffc0000 [ 2121.797204] audit: type=1326 audit(1739299364.036:223): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11584 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f076ec1ab19 code=0x7ffc0000 [ 2121.798802] 9pnet: p9_fd_create_tcp (11626): problem connecting socket to 127.0.0.1 [ 2121.802382] audit: type=1326 audit(1739299364.039:224): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11584 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f076ec1ab19 code=0x7ffc0000 [ 2121.807849] audit: type=1326 audit(1739299364.039:225): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11584 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f076ec1ab19 code=0x7ffc0000 [ 2121.810825] 9pnet: p9_fd_create_tcp (11623): problem connecting socket to 127.0.0.1 [ 2121.815891] 9pnet: p9_fd_create_tcp (11624): problem connecting socket to 127.0.0.1 18:42:44 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:44 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2121.883036] 9pnet: p9_fd_create_tcp (11635): problem connecting socket to 127.0.0.1 [ 2122.009407] 9pnet: p9_fd_create_tcp (11638): problem connecting socket to 127.0.0.1 [ 2122.021786] 9pnet: p9_fd_create_tcp (11639): problem connecting socket to 127.0.0.1 18:42:57 executing program 0: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x6c00, 0x0, 0x0, 0x2e) 18:42:57 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:57 executing program 1: unshare(0x28020600) acct(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4317, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) r1 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x40800, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) unshare(0x18040800) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000440)={0x3, 0x0, 0x0, "dbf57d"}) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x1e) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c6530200a863d9ccfbc3e6b07c1957f07147b07e33018b08994e2501f663ae8e82045f24967f6954c302a9be464d1c9b0ad7314b67e0b74a733598cfe98af09c75be097ed0da6972e78fdc4ad7653134238b09cac62c2d084bfe1978413e2"], 0x45) unshare(0x48020200) 18:42:57 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:57 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRES64, @ANYRESOCT]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:42:57 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xca, 0x81, 0x1, 0x82, 0x0, 0x0, 0x20000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffd, 0x4, @perf_config_ext={0x81, 0x7}, 0x1800, 0x5, 0xffffffd1, 0x7, 0x2, 0x3, 0x49, 0x0, 0x1, 0x0, 0x800}, 0x0, 0xb, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x1, 0x0, [0x0]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x6b8, &(0x7f0000000380)={0x0, 0x8533, 0x0, 0x2, 0x1b0}, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000002c0), &(0x7f0000000400)) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r2, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)={0x54, 0x0, 0x10, 0x70bd2d, 0x25dfdbfc, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x1}, {0xc, 0x8f, 0x11}, {0xc, 0x90, 0x6}}]}, 0x54}}, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x2000}, 0x0) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000280)={0x5, 0x7, 0x9}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r4, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) 18:42:57 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) perf_event_open(&(0x7f0000000440)={0x4, 0x80, 0x20, 0x8, 0x2, 0x4f, 0x0, 0x1f, 0x40290, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xffffffbe, 0x1, @perf_config_ext={0x5, 0x800}, 0x0, 0xa5, 0x2, 0x5, 0xf795, 0x2, 0x1, 0x0, 0xb1e8, 0x0, 0x7f}, 0x0, 0xb, 0xffffffffffffffff, 0x8) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:57 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2135.542122] 9pnet: p9_fd_create_tcp (11657): problem connecting socket to 127.0.0.1 [ 2135.548023] 9pnet: p9_fd_create_tcp (11659): problem connecting socket to 127.0.0.1 [ 2135.550711] program syz-executor.1 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 2135.553981] 9pnet: p9_fd_create_tcp (11664): problem connecting socket to 127.0.0.1 [ 2135.564622] 9pnet: p9_fd_create_tcp (11663): problem connecting socket to 127.0.0.1 18:42:57 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2135.606600] 9pnet: p9_fd_create_tcp (11670): problem connecting socket to 127.0.0.1 [ 2135.614256] ------------[ cut here ]------------ [ 2135.615937] wlan1: Failed check-sdata-in-driver check, flags: 0x4 18:42:57 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x4080, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x800, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3401000017000100000000000000000000000000000000000000f960131be2afed0b000000cef615cf852d00a2f9c4a7bd000000fe800000000000000000000000000000ff02000000000000000000000000000100"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa00"/48, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0x134}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7, 0x6}}, './file0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x200, 0x400000}) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)=ANY=[@ANYRES16, @ANYRESOCT=r5]) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 2135.617823] WARNING: CPU: 0 PID: 11661 at net/mac80211/driver-ops.h:172 drv_bss_info_changed+0x554/0x5f0 [ 2135.620763] Modules linked in: [ 2135.621909] CPU: 0 PID: 11661 Comm: syz-executor.3 Not tainted 5.10.234 #1 [ 2135.623854] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2135.626031] RIP: 0010:drv_bss_info_changed+0x554/0x5f0 [ 2135.627657] Code: 49 8b ac 24 a8 03 00 00 48 85 ed 74 3e e8 54 80 8c fd e8 4f 80 8c fd 8b 54 24 04 48 89 ee 48 c7 c7 80 c8 95 84 e8 2c 04 25 00 <0f> 0b e9 c7 fd ff ff 4c 89 ff e8 2d 78 b8 fd e9 97 fb ff ff 4c 89 [ 2135.637568] RSP: 0018:ffff88804d55f3f0 EFLAGS: 00010282 [ 2135.639101] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 2135.641105] RDX: 0000000000040000 RSI: ffffffff8129ea93 RDI: ffffed1009aabe70 [ 2135.642932] RBP: ffff888046424000 R08: 0000000000000001 R09: ffff88806ce37b0f 18:42:57 executing program 6: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x6, 0x7f, 0xe7, 0x7, 0x0, 0x401, 0x48000, 0x11, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x7, @perf_bp, 0x2040, 0x5, 0x3ff, 0x2, 0x3, 0x8, 0x101, 0x0, 0xfff, 0x0, 0x4e77}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) getsockname(r2, &(0x7f0000000240)=@hci, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) creat(&(0x7f0000000400)='./file1\x00', 0x21) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:42:57 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x248803, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r3) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r2) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2135.644963] R10: 0000000000000000 R11: 0000000000000001 R12: ffff888046424bc0 [ 2135.647002] R13: 0000000000400000 R14: ffff888046425da0 R15: ffff888046425d98 [ 2135.648992] FS: 00007f556ef28700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 2135.651123] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2135.652822] CR2: 0000001b2d728000 CR3: 000000004d542000 CR4: 0000000000350ef0 [ 2135.654810] Call Trace: [ 2135.655785] ? __warn+0xe2/0x1f0 [ 2135.656966] ? drv_bss_info_changed+0x554/0x5f0 [ 2135.658516] ? report_bug+0x1c1/0x210 [ 2135.659792] ? handle_bug+0x41/0x90 [ 2135.660952] ? exc_invalid_op+0x14/0x50 [ 2135.662489] ? asm_exc_invalid_op+0x12/0x20 [ 2135.663858] ? vprintk_func+0x93/0x140 [ 2135.665162] ? drv_bss_info_changed+0x554/0x5f0 [ 2135.666573] ieee80211_bss_info_change_notify+0x9a/0xc0 [ 2135.668149] ieee80211_ocb_leave+0x1ed/0x340 [ 2135.669537] ? nl80211_parse_mon_options+0x45c/0x690 [ 2135.671092] __cfg80211_leave_ocb+0x1d6/0x570 [ 2135.672592] cfg80211_leave_ocb+0x4e/0x70 [ 2135.673887] cfg80211_change_iface+0x843/0xf90 [ 2135.675581] nl80211_set_interface+0x67c/0x8f0 [ 2135.677033] ? nl80211_notify_iface+0x180/0x180 [ 2135.678545] ? nl80211_pre_doit+0x98/0x630 [ 2135.679921] ? nl80211_pre_doit+0xa2/0x630 [ 2135.681471] genl_family_rcv_msg_doit+0x22d/0x330 [ 2135.682990] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 2135.684768] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2135.686587] ? cap_capable+0x1cd/0x230 [ 2135.687860] ? ns_capable+0xe2/0x110 [ 2135.689143] genl_rcv_msg+0x33c/0x5a0 [ 2135.690553] ? genl_get_cmd+0x480/0x480 [ 2135.691892] ? nl80211_notify_iface+0x180/0x180 [ 2135.693541] ? lock_release+0x680/0x680 [ 2135.694895] ? netlink_deliver_tap+0xf4/0xcc0 [ 2135.696504] netlink_rcv_skb+0x14b/0x430 [ 2135.697790] ? genl_get_cmd+0x480/0x480 [ 2135.699081] ? netlink_ack+0xab0/0xab0 [ 2135.700595] ? netlink_deliver_tap+0x1c4/0xcc0 [ 2135.701972] ? is_vmalloc_addr+0x7b/0xb0 [ 2135.703494] genl_rcv+0x24/0x40 [ 2135.704515] netlink_unicast+0x549/0x7f0 [ 2135.705792] ? netlink_attachskb+0x870/0x870 [ 2135.707170] netlink_sendmsg+0x90f/0xdf0 [ 2135.708511] ? netlink_unicast+0x7f0/0x7f0 [ 2135.709785] ? netlink_unicast+0x7f0/0x7f0 [ 2135.711149] __sock_sendmsg+0x154/0x190 [ 2135.712482] ____sys_sendmsg+0x70d/0x870 [ 2135.713768] ? sock_write_iter+0x3d0/0x3d0 [ 2135.715074] ? do_recvmmsg+0x6d0/0x6d0 [ 2135.716588] ___sys_sendmsg+0xf3/0x170 [ 2135.717808] ? sendmsg_copy_msghdr+0x160/0x160 [ 2135.719522] ? __fget_files+0x2cf/0x520 [ 2135.720842] ? lock_downgrade+0x6d0/0x6d0 [ 2135.722134] ? clockevents_program_event+0x14b/0x360 [ 2135.723704] ? __fget_files+0x2f8/0x520 [ 2135.724969] ? __fget_light+0xea/0x290 [ 2135.726452] __sys_sendmsg+0xe5/0x1b0 [ 2135.727686] ? __sys_sendmsg_sock+0x40/0x40 [ 2135.729091] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2135.730621] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2135.732169] ? trace_hardirqs_on+0x5b/0x180 [ 2135.733512] do_syscall_64+0x33/0x40 [ 2135.734752] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2135.736461] RIP: 0033:0x7f55719b2b19 [ 2135.737706] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2135.742035] RSP: 002b:00007f556ef28188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2135.744124] RAX: ffffffffffffffda RBX: 00007f5571ac5f60 RCX: 00007f55719b2b19 [ 2135.746044] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000000000005 [ 2135.748020] RBP: 00007f5571a0cf6d R08: 0000000000000000 R09: 0000000000000000 [ 2135.749837] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2135.751863] R13: 00007ffdb852f6ef R14: 00007f556ef28300 R15: 0000000000022000 [ 2135.753777] irq event stamp: 7581 [ 2135.754944] hardirqs last enabled at (7611): [] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2135.757452] hardirqs last disabled at (7650): [] sysvec_apic_timer_interrupt+0xb/0xa0 [ 2135.759908] softirqs last enabled at (4302): [] asm_call_irq_on_stack+0x12/0x20 [ 2135.762206] softirqs last disabled at (4195): [] asm_call_irq_on_stack+0x12/0x20 [ 2135.764567] ---[ end trace c236630050a2a1ba ]--- 18:42:57 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x248803, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000140)='./file1/file0\x00', 0x2, 0x2, &(0x7f0000000500)=[{&(0x7f0000000200)="f9864b7bd1bb08f882d389b35bc88f6f0072a441f8df288f933df5523c294a1d7d906d61e18213c3ff51d13305a32db7f5", 0x31, 0x1ff}, {&(0x7f0000000440)="ce75c1156412a978d40a9c5e61e4bd52514083da7ede34e5aa22e4282a5cb4a305e7d49df9ced0ba3ad150c9ff74d2ea690d7d0ff7de97bad2808b7fae473a39f11b91a7ce5654d1ca878134e19c4351daeaafd2a9e8d9ff33d42992f1f290a088f2a6d14ecbd85f98f14774aa3d95f023e39ab1f4482fd38332db4413d5a0c662b891198c835abdeb67d5efc2b0c1213473026483557c", 0x97, 0x2e000000000000}], 0x100840, &(0x7f0000000540)={[{@mpol={'mpol', 0x3d, {'prefer'}}}], [{@audit}, {@measure}]}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x7, 0xa, 0x1, 0x0, 0x7f, 0x80000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x480, 0x7fffffff, 0xff5, 0x4, 0x6, 0x566c4482, 0x4, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xb, r0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r2) creat(&(0x7f0000000400)='./file1\x00', 0x21) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x8002, 0x100) close(r1) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0), 0x90, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@posixacl}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/ip6_tables_matches\x00'}}]}}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2135.924393] 9pnet: p9_fd_create_tcp (11684): problem connecting socket to 127.0.0.1 [ 2135.924821] loop5: detected capacity change from 0 to 96468992 [ 2135.960673] 9pnet: p9_fd_create_tcp (11687): problem connecting socket to 127.0.0.1 [ 2136.004590] 9pnet: p9_fd_create_tcp (11688): problem connecting socket to 127.0.0.1 [ 2136.010150] 9pnet: p9_fd_create_tcp (11685): problem connecting socket to 127.0.0.1 [ 2136.030780] 9pnet: p9_fd_create_tcp (11694): problem connecting socket to 127.0.0.1 VM DIAGNOSIS: 18:42:58 Registers: info registers vcpu 0 RAX=0000000000000035 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822dde81 RDI=ffffffff879f3140 RBP=ffffffff879f3100 RSP=ffff88804d55ed88 R8 =0000000000000001 R9 =0000000000000003 R10=0000000000000000 R11=0000000000000001 R12=0000000000000035 R13=0000000000000035 R14=ffffffff879f3100 R15=dffffc0000000000 RIP=ffffffff822dded8 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f556ef28700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b2d728000 CR3=000000004d542000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=1ffff11002dc30b5 RBX=ffff888016e18578 RCX=ffffffff8127fdc1 RDX=dffffc0000000000 RSI=ffffe8ffffc1e398 RDI=ffff888016e185a8 RBP=ffff88800cb87cb0 RSP=ffff888048087ad8 R8 =0000000000000246 R9 =0000000000000003 R10=ffffed1009010f49 R11=0000000000000001 R12=ffff88800915db78 R13=ffff88800cb87cf8 R14=ffff88800cb87d00 R15=ffffe8ffffc1e368 RIP=ffffffff816f606e RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f076c190700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f64446667f8 CR3=000000004844e000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ffffffffffff00ffffffffffffffffff XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000